US20070222610A1 - RFID tag - Google Patents
RFID tag Download PDFInfo
- Publication number
- US20070222610A1 US20070222610A1 US11/723,876 US72387607A US2007222610A1 US 20070222610 A1 US20070222610 A1 US 20070222610A1 US 72387607 A US72387607 A US 72387607A US 2007222610 A1 US2007222610 A1 US 2007222610A1
- Authority
- US
- United States
- Prior art keywords
- unit
- access
- memory unit
- data
- power supply
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
- G06K19/07318—Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
- G06K19/07336—Active means, e.g. jamming or scrambling of the electromagnetic field
Definitions
- the present invention relates to an RFID (Radio Frequency Identification) tag which performs data communication with a communication device such as a reader or a reader/writer through radio waves.
- RFID Radio Frequency Identification
- a general RFID system comprises an RFID tag, which is attached to an article to identify it, and a reader/writer (RFID reader/writer), which is used to read out data stored in a memory in the RFID tag or write data in the memory in the RFID tag.
- RFID reader/writer RFID reader/writer
- RFID technique is contactless access to tag memory. This feature makes it possible to read/write data from/in tag memory even when multiple articles, each of which is attached an RFID tag, are packed in a box without unpacking it. This technique can improve the efficiency of various business processes such as article receiving and shipping, and hence is expected to be applied to various supply chain processes.
- UHF Ultra High Frequency
- HF High Frequency
- RFID technique allows contactless access to tag memory, it is possible that a malicious user reads/rewrites data from/in the RFID tag without letting the owner or authorized user of the RFID tag consent to or notice it. This may pose serious problems in terms of privacy protection and information security.
- reference 1 G. Karjoth and P. Moskowitz, “Disabling RFID tags with Visible Confirmation: Clipped Tags Are Silenced”, In Proceedings of Workshop on Privacy in the Electronic Society, November 2005.) discloses an RFID tag which prevents unwanted access by physically removing some part of an antenna of the RFID tag so as to disable access to the memory from a long distance.
- the present invention has been made to solve this problem, and has as its objective to provide an RFID tag which can prevent unauthorized access from a long distance without physically removing part of an antenna.
- an RFID tag comprising an external power input unit which inputs external power, a first antenna unit which receives power from a communication device, a first power supply unit which extracts power from the radio wave received by the first antenna unit, a memory unit, and a control unit which operates upon receiving power from the first power supply unit and controls permission and inhibition of access from the communication device to the memory unit in accordance with presence/absence of input of power from the external power input unit.
- FIG. 1 is a block diagram showing the schematic arrangement of an RFID tag according to the first embodiment of the present invention
- FIG. 2 is a block diagram showing the arrangement of the control unit of the RFID tag according to the first embodiment
- FIG. 3 is a flowchart for explaining the access inhibition/permission function of the control unit of the RFID tag according to the first embodiment
- FIG. 4 is a view for explaining the operation of the RFID tag in a case wherein an RFID reader/writer is located at a long distance from the RFID tag;
- FIG. 5 is a view for explaining the operation of the RFID tag in a case wherein the RFID reader/writer is located at a short distance from the RFID tag;
- FIG. 6 is a block diagram showing the second embodiment as a modification of the first embodiment
- FIG. 7 is a view showing how an RFID tag according to the second embodiment is used.
- FIG. 8 is a block diagram showing the schematic arrangement of an RFID tag according to the third embodiment of the present invention.
- FIG. 9 is a block diagram showing the arrangement of the control unit of the RFID tag according to the third embodiment.
- FIG. 10 is a flowchart for explaining the access inhibition/permission function of the control unit of the RFID tag according to the third embodiment
- FIG. 11 is a view for explaining the operation of the RFID tag in a case wherein an RFID reader/writer is located at a long distance from the RFID tag;
- FIG. 12 is a view for explaining the operation of the RFID tag in a case wherein the RFID reader/writer is located at a short distance from the RFID tag;
- FIG. 13 is a block diagram showing the fourth embodiment as a modification of the third embodiment
- FIG. 14 is a block diagram showing the schematic arrangement of an RFID tag according to the fifth embodiment of the present invention.
- FIG. 15 is a view showing the relationship between the respective addresses in a data memory unit and the flag values in a flag memory unit in an RFID tag according to the fifth embodiment
- FIG. 16 is a block diagram showing the arrangement of the control unit of the RFID tag according to the fifth embodiment.
- FIG. 17 is a flowchart for explaining the access inhibition/permission function of the control unit of the RFID according to the fifth embodiment
- FIG. 18 is a view for explaining the operation of the RFID tag in a case wherein an RFID reader/writer is located at a long distance from the RFID tag;
- FIG. 19 is a view for explaining the operation of the RFID tag in a case wherein the RFID reader/writer is located at a short distance from the RFID tag;
- FIG. 20 is a block diagram showing the sixth embodiment as a modification of the fifth embodiment
- FIG. 21 is a block diagram showing the schematic arrangement of an RFID tag according to the seventh embodiment of the present invention.
- FIG. 22 is a block diagram showing the arrangement of a control unit for the RFID tag according to the seventh embodiment.
- FIG. 23 is a flowchart for explaining the access inhibition/permission function of the control unit according to the seventh embodiment.
- FIG. 24 is a view for explaining the operation of an RFID tag in a case wherein an RFID reader/writer is located at a long distance from the RFID tag;
- FIG. 25 is a view for explaining the operation of the RFID tag in a case wherein the RFID reader/writer is located at a short distance from the RFID tag;
- FIG. 26 is a block diagram showing the eighth embodiment as a modification of the seventh embodiment.
- FIG. 27 is a view showing how an RFID tag according to the eighth embodiment is used.
- FIG. 28 is a block diagram showing the schematic arrangement of an RFID tag according to the ninth embodiment of the present invention.
- FIG. 29 is a view showing how the RFID tag according to the ninth embodiment is used.
- FIG. 1 shows the schematic arrangement of an RFID tag according to the first embodiment of the present invention.
- an RFID tag 101 according to the first embodiment comprises a first antenna unit 1 which transmits/receives radio waves to/from an RFID reader/writer 200 , a first power supply unit 2 which extracts power from the radio wave received by the first antenna unit 1 , a data reception unit 3 which decodes a command contained in the radio wave received by the first antenna unit 1 and transmits the resultant data to a control unit 5 , a data transmission unit 4 which encodes the return data transmitted from the control unit 5 in a transmission radio wave from the first antenna unit 1 , the control unit 5 which interprets the command contained in the radio wave received by the first antenna unit 1 and accesses a memory unit 6 , the memory unit 6 which stores an ID, user data, and the like and an external power input unit 12 which inputs external power.
- the external power input unit 12 comprises a second antenna unit 7 having lower radio wave reception sensitivity than the first antenna unit 1 , and a second power supply
- the first antenna unit 1 and the second antenna unit 7 use the same frequency band for communication.
- L 1 be the communicable distance of the first antenna unit 1
- L 2 be the communicable distance of radio waves from the second antenna unit 7
- the size of the second antenna unit 7 is set to be sufficiently smaller than that of the first antenna unit 1 so as to set the communicable distance L 1 of the first antenna unit 1 to a long distance and set the communicable distance L 2 of radio waves from the second antenna unit 7 to a short distance.
- the control unit 5 operates upon receiving power from the first power supply unit 2 .
- the control unit 5 has, as a function unique to this embodiment, an access inhibition/permission function of inhibiting and permitting access to the memory unit 6 on the basis of whether power (external power) is input from the second power supply unit 8 .
- the control unit 5 has two functional units, i.e., an access inhibition unit 5 A which inhibits access from the RFID reader/writer 200 to the memory unit 6 through the first antenna unit 1 if no power is received from the second power supply unit 8 , and an access permission unit 5 B which permits access from the RFID reader/writer 200 to the memory unit 6 through the first antenna unit 1 if power is received from the second power supply unit 8 .
- the access inhibition/permission function of the control unit 5 will be described with reference to the flowchart shown in FIG. 3 .
- the RFID reader/writer 200 is located at along distance (between L 1 and L 2 ).
- the first antenna unit 1 of the RFID tag 101 receives a radio wave from the RFID reader/writer 200
- the first power supply unit 2 supplies power extracted from the radio wave received by the first antenna unit 1 to the control unit 5 .
- the control unit 5 operates upon receiving the power from the first power supply unit 2 , and checks whether the command contained in the radio wave received by the first antenna unit 1 is a data access request (step S 101 ).
- step S 101 the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 102 ). If no power is supplied from the second power supply unit 8 (NO in step S 102 ), the process advances to step S 109 . If power is supplied from the second power supply unit 8 (YES in step S 102 ), the process advances to step S 103 .
- step S 102 the control unit 5 advances to step S 109 to inhibit access to the memory unit 6 which is based on the data access request received in step S 101 and transmit an error response to the RFID reader/writer 200 through the data transmission unit 4 (step S 110 ).
- the RFID reader/writer 200 may not be an authorized communication device but may be a malicious communication device.
- the first embodiment inhibits access from the RFID reader/writer 200 at a long distance to the memory unit 6 in the RFID tag 101 regardless of whether the RFID reader/writer 200 is an authorized communication device. This prevents malicious access from a long distance.
- the RFID reader/writer 200 is located at a short distance (within L 2 ).
- the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of the second antenna unit 7 of the RFID tag 101 .
- the first and second power supply units then send the extracted power to the control unit 5 .
- the control unit 5 operates upon receiving the power from the first power supply unit 2 , and checks whether the command contained in the radio wave received by the first antenna unit 1 is a data access request (step S 101 ). If the command is a data access request (YES in step S 101 ), the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 102 ). If no power is supplied from the second power supply unit 8 , the process advances to step S 109 . If power is supplied from the second power supply unit 8 , the process advances to step S 103 .
- step S 102 the control unit 5 advances to step S 103 to permit access to the memory unit 6 which is based on the data access request received in step S 101 .
- the control unit 5 then checks whether the data access request is a data read request or data write request (step S 104 ).
- the control unit 5 reads out the request data from the memory unit 6 (step S 105 ), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S 106 ).
- the control unit 5 writes the received data in the memory unit 6 (step S 107 ), and returns a response indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S 108 ).
- the access inhibition unit 5 A of the control unit 5 performs the processing in step S 109 if NO in step S 102
- the access permission unit 5 B performs the processing in step S 103 if YES in step S 102 .
- the RFID reader/writer 200 may not be an authorized communication device but may be a malicious communication device.
- the first embodiment permits access from the RFID reader/writer 200 at a short distance to the memory unit 6 in the RFID tag 101 regardless of whether the RFID reader/writer 200 is an authorized communication device. Even if some person has made malicious access, since such access must be made from a short distance, the user of the RFID tag can easily visually check the access. This can prevent any person from making malicious access without letting the user of the RFID tag 101 consent to or notice it.
- the RFID tag 101 shown in FIG. 1 is configured such that the first antenna unit 1 and the second antenna unit 7 use the same frequency band for communication.
- the frequency band of the first antenna unit 1 may differ from that of the second antenna unit 7
- the RFID tag 101 may include another radio wave source to the second antenna unit 7 .
- the frequency band of a first antenna unit 1 is made to differ from that of a second antenna unit 7 , and a radio wave source 300 is provided for the second antenna unit 7 independently of an RFID reader/writer 200 .
- the second antenna unit 7 receives a radio wave from the radio wave source 300 . Since the power of the received radio wave is sufficiently high for the reception sensitivity of the second antenna unit 7 , and hence a second power supply unit 8 extracts power from the received radio wave. This makes a control unit 5 permit access from the RFID reader/writer 200 to a memory unit 6 .
- using the radio wave source 300 allows access from the RFID reader/writer 200 to the memory unit 6 in the RFID tag 101 ′ regardless of whether the RFID reader/writer 200 is an authorized communication device. Since the radio wave source 300 must be brought close to the RFID tag 101 ′, the user can easily visually check malicious access.
- FIG. 7 shows how the user uses the RFID tag 101 ′.
- the third embodiment sets only data requiring protection as a target for unauthorized access prevention by switching memory units for storage depending on the type of data, thereby further improving the convenience in using data.
- FIG. 8 shows the schematic arrangement of an RFID tag according to the third embodiment of the present invention.
- An RFID tag 102 of the third embodiment has an arrangement in which a memory unit 6 is divided into a protected memory unit 6 A and an unprotected memory unit 6 B.
- the protected memory unit 6 A stores data which need protection.
- the unprotected memory unit 6 B stores data which do not need protection.
- a control unit 5 comprises two functional units, i.e., an access inhibition unit 5 C which inhibits access from an RFID reader/writer 200 to the protected memory unit 6 A through a first antenna unit 1 if no power is received from a second power supply unit 8 , and an access permission unit 5 D which permits access from the RFID reader/writer 200 to the protected memory unit 6 A through the first antenna unit 1 if power is received from the second power supply unit 8 .
- the access inhibition/permission function of the control unit 5 of the RFID tag 102 according to the third embodiment will be described with reference to the flowchart shown in FIG. 10 .
- the RFID reader/writer 200 is located at a long distance (between L 1 and L 2 ).
- the first antenna unit 1 of the RFID tag 102 receives a radio wave from the RFID reader/writer 200 , and a first power supply unit 2 supplies power extracted from the radio wave received by the first antenna unit 1 to the control unit 5 .
- the control unit 5 operates upon receiving the power from the first power supply unit 2 , and checks whether the command contained in the radio wave received by the first antenna unit 1 is a data access request (step S 201 ).
- step S 201 If the command from the RFID reader/writer 200 is a data access request (YES in step S 201 ), the control unit 5 checks whether the command is an access request to the protected memory unit 6 A (step S 202 ). If the command is an access request to the protected memory unit 6 A (YES in step S 202 ), the process advances to step S 203 . If the command is not an access request to the protected memory unit 6 A (NO in step S 202 ), the process advances to step S 205 .
- step S 202 If the command is an access request to the protected memory unit 6 A (YES in step S 202 ), the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 203 ). If no power is supplied from the second power supply unit 8 (NO in step S 203 ), the process advances to step S 210 . If power is supplied from the second power supply unit 8 (YES in step S 203 ), the process advances to step S 204 .
- step S 203 the control unit 5 advances to step S 210 to inhibit access to the protected memory unit 6 A which is based on the data access request received in step S 201 and transmit an error response to the RFID reader/writer 200 through a data transmission unit 4 (step S 211 ).
- control unit 5 determines that the command is an access request to the unprotected memory unit 6 B, and checks whether the access request is a data read request or a data write request (step S 205 ).
- the control unit 5 reads out requested data from the unprotected memory unit 6 B (step S 206 ), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S 207 ).
- the control unit 5 writes the received data in the unprotected memory unit 6 B (step S 208 ), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S 209 ).
- the RFID reader/writer 200 may not be an authorized communication device but may be a malicious communication device.
- the third embodiment permits access from the RFID reader/writer 200 at a long distance to the unprotected memory unit 6 B in the RFID tag 102 regardless of whether the RFID reader/writer 200 is an authorized communication device.
- the embodiment inhibits access to the protected memory unit 6 A. This allows access from a long distance to data requiring no protection and can properly protect only data requiring protection against unauthorized access from a long distance.
- the RFID reader/writer 200 is located at a short distance (within L 2 ).
- the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of the second antenna unit 7 of the RFID tag 102 .
- the first and second power supply units then send the extracted power to the control unit 5 .
- the control unit 5 operates upon receiving power from the first power supply unit 2 , and checks whether the command contained in the power received by the first antenna unit 1 is a data access request (step S 201 ).
- step S 201 If the command from the RFID reader/writer 200 is a data access request (YES in step S 201 ), the control unit 5 checks whether the command is an access request to the protected memory unit 6 A (step S 202 ). If the command is an access request to the protected memory unit 6 A (YES in step S 202 ), the process advances to step S 203 . If the command is not an access request to the protected memory unit 6 A (NO in step S 202 ), the process advances to step S 205 .
- step S 203 the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 203 ). If no power is supplied from the second power supply unit 8 (NO in step S 203 ), the process advances to step S 210 . If power is supplied from the second power supply unit 8 (YES in step S 203 ), the process advances to step S 204 . In this case, since the RFID reader/writer 200 is located within L 2 , the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of the second antenna unit 7 , and the second power supply unit 8 supplies power to the control unit 5 .
- step S 203 the control unit 5 advances to step S 204 to permit access to the protected memory unit 6 A which is based on the data access request received in step S 201 .
- the control unit 5 then checks whether the data access request to the protected memory unit 6 A is a data read request or data write request (step S 205 ).
- the control unit 5 reads out the request data from the protected memory unit 6 A (step S 206 ), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S 207 ).
- the control unit 5 writes the received data in the protected memory unit 6 A (step S 208 ), and returns a response indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S 209 ).
- the access inhibition unit 5 C of the control unit 5 performs the processing in step S 210 if NO in step S 203
- the access permission unit 5 D performs the processing in step S 204 if YES in step S 203 .
- the RFID reader/writer 200 may not be an authorized communication device but may be a malicious communication device.
- the third embodiment permits access from the RFID reader/writer 200 at a short distance to the protected memory unit 6 A in the RFID tag 102 regardless of whether the RFID reader/writer 200 is an authorized communication device. Even if some person has made malicious access, since such access must be made from a short distance, the user of an RFID tag can easily visually check the access. This can prevent any person from making malicious access without letting the user of the RFID tag 102 consent to or notice it.
- the RFID tag 102 shown in FIG. 8 is configured such that the first antenna unit 1 and the second antenna unit 7 use the same frequency band for communication. However, the frequency band of the first antenna unit 1 may differ from that of the second antenna unit 7 , and the RFID tag 102 may include another radio wave source to the second antenna unit 7 .
- the frequency band of a first antenna unit 1 is made to differ from that of a second antenna unit 7 , and a radio wave source 300 is provided for the second antenna unit 7 independently of an RFID reader/writer 200 .
- the second antenna unit 7 receives a radio wave from the radio wave source 300 . Since the radio field intensity of the received radio wave is sufficiently high for the reception sensitivity of the second antenna unit 7 , and hence a second power supply unit 8 extracts power from the received radio wave. This makes a control unit 5 permit access from the RFID reader/writer 200 to a protected memory unit 6 A.
- using the radio wave source 300 allows access from the RFID reader/writer 200 to the protected memory unit 6 A in the RFID tag 102 ′ regardless of whether the RFID reader/writer 200 is an authorized communication device. Since the radio wave source 300 must be brought close to the RFID tag 102 ′, the user can easily visually check malicious access.
- all the data stored in the memory unit 6 are protection targets. However, it is conceivable that some data requires no protection depending on the type of data.
- the fifth embodiment therefore, sets only data requiring protection as a target for unauthorized access prevention by designating permission/inhibition of data read access and data write access to corresponding addresses in the data memory unit by using flag values in a flag memory unit, thereby further improving the convenience in using data.
- FIG. 14 shows the schematic arrangement of an RFID tag according to the fifth embodiment of the present invention.
- An RFID tag 103 of the fifth embodiment has an arrangement in which a memory unit 6 is divided into a data memory unit 6 C and a flag memory unit 6 D.
- the data memory unit 6 C stores an ID, user data, and the like.
- the flag memory unit 6 D stores flag values indicating whether data stored at the addresses in the data memory 6 C need protection.
- FIG. 15 shows the relationship between the respective addresses in the data memory unit 6 C and the flag values in the flag memory unit 6 D.
- the data memory unit 6 C and the flag memory unit 6 D have the same address arrangement.
- flag values designating permission/inhibition (protection/no protection) of data write access and data read access to the corresponding addresses in the data memory unit 6 C are stored.
- a flag value of “1” represents a protected state
- a flag value of “0” represents an unprotected state.
- This example designates protection/no protection for each address in the data memory unit 6 C. It is also possible to divide the data memory unit 6 C into blocks each comprising multiple addresses and designate protection/no protection for each block in the flag memory unit 6 D.
- a control unit 5 has two functional units, i.e., an access inhibition unit 5 E and an access permission unit 5 F.
- the access inhibition unit 5 E inhibits access from an RFID reader/writer 200 to the flag memory unit 6 D through a first antenna unit 1 if no power is received from a second power supply unit 8 , and also inhibits access from the RFID reader/writer 200 to a data storage area in the data memory unit 6 C, which is in protected state by a flag value in the flag memory unit 6 D, through the first antenna unit 1 .
- the access permission unit 5 F permits access from the RFID reader/writer 200 to the flag memory unit 6 D through the first antenna unit 1 if power is received from the second power supply unit 8 , and also permits access from the RFID reader/writer 200 to a data storage area in the data memory unit 6 C, which is in protected state by a flag value in the flag memory unit 6 D, through the first antenna unit 1 .
- the RFID reader/writer 200 is located at a long distance (between L 1 and L 2 ).
- a first antenna unit 1 of an RFID tag 102 receives a radio wave from the RFID reader/writer 200
- a first power supply unit 2 supplies power extracted from the radio wave received by the first antenna unit 1 to the control unit 5 .
- the control unit 5 operates upon receiving the power from the first power supply unit 2 , and checks whether the command contained in the radio wave received by the first antenna unit 1 is a data access request (step S 301 ).
- step S 301 the control unit 5 checks whether the command is an access request to the data memory unit 6 C or an access request to the flag memory unit 6 D (step S 302 ). If the command is an access request to the data memory unit 6 C, the process advances to step S 303 . If the command is an access request to the flag memory unit 6 D, the process advances to step S 304 .
- step S 304 the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 304 ). If no power is supplied from the second power supply unit 8 (NO in step S 304 ), the process advances to step S 311 . If power is supplied from the second power supply unit 8 (YES in step S 304 ), the process advances to step S 305 .
- step S 304 the control unit 5 advances to step S 311 to inhibit access to the flag memory unit 6 D which is based on the data access request received in step S 301 and transmits an error response to the RFID reader/writer 200 through a data transmission unit 4 (step S 312 ).
- step S 303 the control unit 5 checks whether the address in the data memory unit 6 C to which the access requested is in the protected state, by accessing the corresponding address in the flag memory unit 6 D (step S 303 ). If the address is in the protected state (YES in step S 303 ), the process advances to step S 304 . If the address in not in the protected state (NO in step S 303 ), the process advances to step S 306 .
- step S 304 the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 304 ). If no power is supplied from the second power supply unit 8 , the process advances to step S 311 . If power is supplied from the second power supply unit 8 , the process advances to step S 305 .
- step S 304 the control unit 5 advances to step S 311 to inhibit access to the data memory unit 6 C which is based on the data access request received in step S 301 and transmit an error response to the RFID reader/writer 200 through the data transmission unit 4 (step S 312 ).
- control unit 5 determines that it is possible to access the data memory unit 6 C, and checks whether the access request is a data read request or a data write request (step S 306 ).
- the control unit 5 reads out the requested data from the data memory unit 6 C (step S 307 ), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S 308 ).
- the control unit 5 writes the received data in the data memory unit 6 C (step S 309 ), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S 310 ).
- the RFID reader/writer 200 may not be an authorized communication device but may be a malicious communication device.
- the fifth embodiment permits access from the RFID reader/writer 200 at a long distance to an unprotected address in the data memory unit 6 C in the RFID tag 102 and inhibits access to a protected address regardless of whether the RFID reader/writer 200 is an authorized communication device. This allows access from a long distance to data requiring no protection and can properly protect only data requiring protection against unauthorized access from a long distance.
- the fifth embodiment inhibits access from the RFID reader/writer 200 at a long distance to the flag memory unit 6 D regardless of whether the RFID reader/writer 200 is an authorized communication device. This eliminates the possibility of malicious rewriting the designation of a protected state or an unprotected state with respect to the address in the data memory unit 6 C.
- the RFID reader/writer 200 is located at a short distance (within L 2 ).
- the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of the second antenna unit 7 of the RFID tag 102 .
- the first and second power supply units then send the extracted power to the control unit 5 .
- the control unit 5 operates upon receiving the power from the first power supply unit 2 , and checks whether the command contained in the radio wave received by the first antenna unit 1 is a data access request (step S 301 ).
- step S 301 the control unit 5 checks whether the command is an access request to the data memory unit 6 C or an access request to the flag memory unit 6 D (step S 302 ). If the command is an access request to the data memory unit 6 C, the process advances to step S 303 . If the command is an access request to the flag memory unit 6 D, the process advances to step S 304 .
- step S 304 the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 304 ). If no power is supplied from the second power supply unit 8 (NO in step S 304 ), the process advances to step S 311 . If power is supplied from the second power supply unit 8 (YES in step S 304 ), the process advances to step S 305 .
- step S 304 the control unit 5 advances to step S 305 to permit access to the flag memory unit 6 D which is based on the data access request received in step S 301 .
- the control unit 5 then checks whether the access request to the flag memory unit 6 D is a data read request or a data write request (step S 306 ).
- the control unit 5 reads out the requested data from the data memory unit 6 C (step S 307 ), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S 308 ).
- the control unit 5 writes the received data in the flag memory unit 6 D (step S 309 ), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S 310 ).
- step S 303 the control unit 5 checks whether the address in the data memory unit 6 C to which the access requested is in the protected state, by accessing the corresponding address in the flag memory unit 6 D (step S 303 ). If the address is in the protected state (YES in step S 303 ), the process advances to step S 304 . If the address in not in the protected state (NO in step S 303 ), the process advances to step S 306 .
- step S 304 the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 304 ). If no power is supplied from the second power supply unit 8 , the process advances to step S 311 . If power is supplied from the second power supply unit 8 (YES in step S 304 ), the process advances to step S 305 .
- step S 304 the control unit 5 advances to step S 305 to permit access to the data memory unit 6 C which is based on the data access request received in step S 301 .
- the control unit 5 then checks whether the access request to the data memory unit 6 C is a data read request or data write request (step S 306 ).
- the control unit 5 reads out the requested data from the access inhibition unit 5 C (step S 307 ), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S 308 ).
- the control unit 5 writes the received data in the data memory unit 6 C (step S 309 ), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S 310 ).
- control unit 5 checks whether the access request is a data read request or a data write request (step S 306 ).
- the control unit 5 performs read processing (steps S 307 and S 308 ) of data from the data memory unit 6 C or write processing (steps S 309 and S 310 ) of data in the data memory unit 6 C in accordance with the check result.
- the access inhibition unit 5 E of the control unit 5 performs the processing in step S 311 if NO in step S 304
- the access permission unit 5 D performs the processing in step S 305 if YES in step S 304 .
- the RFID reader/writer 200 may not be an authorized communication device but may be a malicious communication device.
- the fifth embodiment permits all access from the RFID reader/writer 200 at a short distance to the data memory unit 6 C in the RFID tag 103 regardless of whether the RFID reader/writer 200 is an authorized communication device and the accessed data is the protected state/unprotected state.
- This embodiment also permits access to the flag memory unit 6 D in the RFID tag 103 . Even if some person has made malicious access, since such access must be made from a short distance, the user of an RFID tag can easily visually check the access. This can prevent any person from making malicious access without letting the user of the RFID tag 103 consent to or notice it.
- the RFID tag 103 shown in FIG. 14 is configured such that the first antenna unit 1 and the second antenna unit 7 use the same frequency band for communication. However, the frequency band of the first antenna unit 1 may differ from that of the second antenna unit 7 , and the RFID tag 103 may include another radio wave source to the second antenna unit 7 .
- the frequency band of a first antenna unit 1 is made to differ from that of a second antenna unit 7 , and a radio wave source 300 is provided for the second antenna unit 7 independently of an RFID reader/writer 200 .
- the second antenna unit 7 receives a radio wave from the radio wave source 300 . Since the power of the received radio wave is sufficiently high for the reception sensitivity of the second antenna unit 7 , a second power supply unit 8 extracts power from the received radio wave. This makes a control unit 5 permit access from the RFID reader/writer 200 to a protected address in a data memory unit 6 C.
- using the radio wave source 300 allows access from the RFID reader/writer 200 to a protected address in the data memory unit 6 C in the RFID tag 103 ′ regardless of whether the RFID reader/writer 200 is an authorized communication device. Since the radio wave source 300 must be brought close to the RFID tag 103 ′, the user can easily visually check malicious access.
- the third embodiment uses the second antenna unit 7 and the second power supply unit 8 only for the purpose of determining whether to permit access from the RFID reader/writer 200 to the protected memory unit 6 A through the first antenna unit 1 , and cannot perform data communication through the second antenna unit 7 .
- the seventh embodiment therefore includes a second data reception unit and a second data transmission unit for a second antenna unit 7 to allow data communication through the second antenna unit 7 , thereby further improving the convenience in using data.
- FIG. 21 shows the schematic arrangement of an RFID tag according to the seventh embodiment of the present invention.
- An RFID tag 104 according to the seventh embodiment is obtained by partially changing the arrangement of the RFID tag 102 according to the third embodiment. That is, this embodiment uses an external power input unit 12 not only for the supply of external power but also for data communication with an RFID reader/writer 200 .
- this embodiment includes a data reception unit 3 and a data transmission unit 4 for a first antenna unit 1 as a first data reception unit and a first data transmission unit, respectively.
- the external power input unit 12 includes a second data reception unit 9 and a second data transmission unit 10 in addition to a second antenna unit 7 and a second power supply unit 8 .
- the second data reception unit 9 decodes the command contained in the radio wave received from the RFID reader/writer 200 and transmits the resultant data to a control unit 5 .
- the second data transmission unit 10 encodes the return data transmitted from the control unit 5 in a transmission radio wave from the second antenna unit 7 .
- the control unit 5 comprises two functional units, i.e., an access inhibition unit 5 G which inhibits access from the RFID reader/writer 200 to a protected memory unit 6 A through the first antenna unit 1 if no power is received from the second power supply unit 8 , and an access permission unit 5 H which permits access from the RFID reader/writer 200 to the protected memory unit 6 A through the second antenna unit 7 if power is received from the second power supply unit 8 .
- an access inhibition unit 5 G which inhibits access from the RFID reader/writer 200 to a protected memory unit 6 A through the first antenna unit 1 if no power is received from the second power supply unit 8
- an access permission unit 5 H which permits access from the RFID reader/writer 200 to the protected memory unit 6 A through the second antenna unit 7 if power is received from the second power supply unit 8 .
- the access inhibition/permission function of the control unit 5 of the RFID tag 104 according to the seventh embodiment will be described below with reference to the flowchart shown in FIG. 23 .
- the RFID reader/writer 200 is located at a long distance (between L 1 and L 2 ).
- the first antenna unit 1 of the RFID tag 102 receives a radio wave from the RFID reader/writer 200 , and a first power supply unit 2 supplies power extracted from the radio wave received by the first antenna unit 1 to the control unit 5 .
- the control unit 5 operates upon receiving the power from the first power supply unit 2 , and checks whether the command contained in the radio wave received by the first antenna unit 1 is a data access request (step S 401 ).
- step S 401 the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 402 ). If no power is supplied from the second power supply unit 8 (NO in step S 402 ), the process advances to step S 403 . If power is supplied from the second power supply unit 8 (YES in step S 402 ), the process advances to step S 411 .
- step S 402 the control unit 5 advances to step S 403 to check whether the data access request received through the first antenna unit 1 is an access request to the protected memory unit 6 A.
- step S 403 If the data access request is an access request to the protected memory unit 6 A (YES in step S 403 ), the control unit 5 inhibits access to the protected memory unit 6 A which is based on the data access request received in step S 401 (step S 409 ), and transmits an error response to the RFID reader/writer 200 through the data transmission unit 4 (step S 410 ).
- control unit 5 determines that the data access request is an access request to the unprotected memory unit 6 B, and checks whether the access request is a data read request or a data write request (step S 404 ).
- control unit 5 reads out the requested data from an unprotected memory unit 6 B (step S 405 ), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S 406 ).
- the control unit 5 writes the first received data in the unprotected memory unit 6 B (step S 407 ), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S 408 ).
- the RFID reader/writer 200 may not be an authorized communication device but may be a malicious communication device.
- the seventh embodiment inhibits access from the RFID reader/writer 200 at a long distance to the protected memory unit 6 A in the RFID tag 104 regardless of whether the RFID reader/writer 200 is an authorized communication device. This allows access from a long distance to data requiring no protection and can protect only data requiring protection against malicious access from a long distance.
- the RFID reader/writer 200 is located at a short distance (within L 2 ).
- the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of the second antenna unit 7 of the RFID tag 104 .
- the first and second power supply units then send the extracted power to the control unit 5 .
- the control unit 5 operates upon receiving power from the first power supply unit 2 , and checks whether the command contained in the radio wave received by the first antenna unit 1 is a data access request (S 401 ).
- step S 401 the control unit 5 checks whether power is supplied from the second power supply unit 8 (step S 402 ). If no power is supplied from the second power supply unit 8 (NO in step S 402 ), the process advances to step S 403 . If power is supplied from the second power supply unit 8 (YES in step S 402 ), the process advances to step S 411 .
- step S 402 the control unit 5 advances to step S 411 .
- step S 411 the control unit 5 validates the data access request received through the second antenna unit 7 , and permits all access to the memory unit 6 including the protected memory unit 6 A which is based on the data access request.
- the control unit 5 then checks whether the access request is a data read request or a data write request (step S 412 ).
- the control unit 5 reads out the requested data from the memory unit 6 (the protected memory unit 6 A or the unprotected memory unit 6 B) (step S 413 ), and returns the readout data to the RFID reader/writer 200 through the second data transmission unit 10 (step S 414 ).
- the control unit 5 writes the received data in the memory unit 6 (the protected memory unit 6 A or the unprotected memory unit 6 B) (step S 415 ), and returns information indicating a write success to the RFID reader/writer 200 through the second data transmission unit 10 (step S 416 ).
- step S 403 the access inhibition unit 5 G of the control unit 5 performs the processing in step S 409 . If YES in step S 402 , the access permission unit 5 H performs the processing in step S 411 .
- the RFID reader/writer 200 may not be an authorized communication device but may be a malicious communication device.
- the seventh embodiment permits access from the RFID reader/writer 200 at a short distance to the protected memory unit 6 A in the RFID tag 104 regardless of whether the RFID reader/writer 200 is an authorized communication device. Even if some person has made malicious access, since such access must be made from a short distance, the user of an RFID tag can easily visually check the access. This can prevent any person from making malicious access without letting the user of the RFID tag 104 consent to or notice it.
- the RFID tag 103 according to the fifth embodiment shown in FIG. 14 can have the same effect as that of the seventh embodiment by having the second antenna unit 7 , second power supply unit 8 , second data reception unit 9 , and second data transmission unit 10 .
- an access inhibition unit 5 E of the control unit 5 in the RFID tag 103 of the fifth embodiment inhibits access from the RFID reader/writer 200 to a flag memory unit 6 D through the first antenna unit 1 if no power is received from the second power supply unit 8 , and also inhibits access from the RFID reader/writer 200 to the data storage area in a data memory unit 6 C, which is in protected state by a flag value in the flag memory unit 6 D, through the first antenna unit 1 .
- an access permission unit 5 F permits access from the RFID reader/writer 200 to the flag memory unit 6 D through the second antenna unit 7 if power is received from the second power supply unit 8 , and also permits access from the RFID reader/writer 200 to the data storage area in the data memory unit 6 C, which is in protected state by a flag value in the flag memory unit 6 D, through the second antenna unit 7 .
- the RFID tag 104 shown in FIG. 21 is configured such that the first antenna unit 1 and the second antenna unit 7 use the same frequency band for communication. However, the frequency band of the first antenna unit 1 may differ from that of the second antenna unit 7 , and the RFID tag 104 may include another RFID reader/writer which performs data communication through the second antenna unit 7 .
- the frequency band of a first antenna unit 1 is made to differ from that of a second antenna unit 7 , and this embodiment includes a second RFID reader/writer 400 which performs data communication through the second antenna unit 7 separately from an RFID reader/writer 200 which performs data communication through the first antenna unit 1 .
- the second antenna unit 7 receives a radio wave from the second RFID reader/writer 400 . Since the power of the received radio wave is sufficiently high for the reception sensitivity of the second antenna unit 7 , a second power supply unit 8 extracts power from the received radio wave. This makes a control unit 5 validate the data access request received through the second antenna unit 7 , and allows all access from the second RFID reader/writer 400 to a memory unit 6 including a protected memory unit 6 A.
- using the second RFID reader/writer 400 allows access to the protected memory unit 6 A in the RFID tag 104 ′ regardless of whether the RFID reader/writer 200 is an authorized communication device. Since the RFID reader/writer 400 must be brought close to the RFID tag 104 ′, the user can easily visually check malicious access.
- FIG. 27 shows how the user uses the RFID tag 104 ′.
- FIG. 28 shows the schematic arrangement of an RFID tag according to the ninth embodiment of the present invention.
- An RFID tag 105 of the ninth embodiment comprises a connection terminal 11 to an external power supply 500 instead of the second antenna unit 7 and the second power supply unit 8 as external power input units as compared with the RFID tag 101 of the first embodiment.
- the first embodiment extracts external power from the radio wave received through the second antenna unit 7 , and the control unit 5 determines, in accordance with the presence/absence of input of the extracted external power, whether to permit/inhibit access to the memory unit 6 .
- a control unit 5 determines, in accordance with the presence/absence of input of external power from the connection terminal 11 , whether to permit/inhibit access to a memory unit 6 .
- the arrangement of the control unit 5 in the ninth embodiment is the same as that of the first embodiment, and a description thereof will be omitted.
- the ninth embodiment includes the external power supply 500 in an RFID reader/writer 200 .
- the external power supply 500 does not connect to the connection terminal 11 unless the RFID tag 105 has physical contact with the RFID reader/writer 200 , thereby preventing malicious contactless access. Even if some person has made malicious access, since such access must be made by making a malicious RFID reader/writer have physical contact with an RFID tag, the user can easily visually check the access.
- FIG. 29 shows how the RFID tag 105 is used.
- the ninth embodiment provides the external power supply 500 for the RFID reader/writer 200
- the external power supply 500 can be provided outside of the RFID reader/writer 200 .
- the RFID tag 102 ( FIG. 8 ) of the third embodiment or the RFID tag 103 ( FIG. 14 ) of the fifth embodiment have the connection terminal 11 for the external power supply 500 instead of the second antenna unit 7 and the second power supply unit 8 as external power input units makes it possible to obtain the same effects as those of the RFID tag 105 of the ninth embodiment.
- Each embodiment described above uses the RFID reader/writer capable of reading and writing data as a communication device which performs data communication with an RFID tag. However, each embodiment may use an RFID reader capable of only reading out data as a communication device.
- Reference 2 Japanese Patent Laid-Open No. 2001-167241
- reference 3 Japanese Patent Laid-Open No. 2004-213582
- Reference 4 Japanese Patent Laid-Open No. 2003-283366 discloses an arrangement in which a memory unit includes a flag storage unit for indicating protection/no protection of data.
- these references only partially describe part of the features of the present invention, but disclose nothing about important techniques, e.g., controlling permission and inhibition of access from a communication device to a memory unit in accordance with presence/absence of input of external power from the second power supply unit and the connection terminal.
- the RFID tag 101 of the present invention includes, as the external power input unit 12 , the second antenna unit 7 having lower radio wave reception sensitivity than the first antenna unit 1 and the second power supply unit 8 which extracts power from the radio wave received by the second antenna unit 7 .
- the control unit 5 includes an access inhibition unit 5 A which inhibits access from a communication device to the memory unit 6 through the first antenna unit 1 if no power is received from the second power supply unit 8 , and an access permission unit 5 B which permits access from the communication device to the memory unit 6 through the first antenna unit 1 if power is received from the second power supply unit 8 .
- the first antenna unit 1 of the RFID tag 101 receives a radio wave from the communication device.
- the second power supply unit 8 cannot extract power, and hence sends no power (external power) to the control unit 5 .
- the power of radio waves from the communication device is sufficiently high for the reception sensitivity of the second antenna unit 7 .
- the first and second antenna units send the extracted power to the control unit 5 .
- the RFID tag 102 of the present invention includes, as the external power input unit 12 , the second antenna unit 7 having lower radio wave reception sensitivity than the first antenna unit 1 and the second power supply unit 8 which extracts power from the radio wave received by the second antenna unit 7 .
- the memory unit 6 includes the protected memory unit 6 A which stores data needing protection and the unprotected memory unit 6 B which stores data needing no protection.
- the control unit 5 includes the access inhibition unit 5 C which inhibits access from a communication device to the protected memory unit 6 A through the first antenna unit 1 if no power is received from the second power supply unit 8 , and the access permission unit 5 D which permits access from the communication device to the protected memory unit 6 A through the first antenna unit 1 if power is received from the second power supply unit 8 .
- the first antenna unit 1 of the RFID tag 102 receives a radio wave from the communication device. This makes the first power supply unit 2 extract power from the radio wave received by the first antenna unit 1 and send the extracted power to the control unit 5 .
- the second power supply unit 8 since the power of radio waves from the communication device is insufficient for the reception sensitivity of the second antenna unit 7 , the second power supply unit 8 cannot extract power, and hence cannot send power (external power) to the control unit 5 .
- this arrangement allows access from the communication device to the unprotected memory unit 6 B through the first antenna unit 1 , i.e., access from the communication device at a long distance to the unprotected memory unit 6 B in the RFID tag 102 .
- the power of radio waves from the communication device is sufficiently high for the reception sensitivity of the second antenna unit 7 .
- the first and second antenna units send the extracted power to the control unit 5 .
- the RFID tag 103 of the present invention includes, as the external power input unit 12 , the second antenna unit 7 having lower radio wave reception sensitivity than the first antenna unit 1 and the second power supply unit 8 which extracts power from the radio wave received by the second antenna unit 7 .
- the memory unit 6 includes the data memory unit 6 C which stores data and the flag memory unit 6 D which stores, flag values indicating data stored at the addresses in the data memory unit 6 C need protection.
- the first antenna unit 1 of the RFID tag 103 receives a radio wave from the communication device. This makes the first power supply unit 2 extract power from the radio wave received by the first antenna unit 1 and send the extracted power to the control unit 5 .
- the second power supply unit 8 since the power of radio waves from the communication device is insufficient for the reception sensitivity of the second antenna unit 7 , the second power supply unit 8 cannot extract power, and hence cannot send power (external power) to the control unit 5 .
- each data storage area in the data memory unit can be, for example, an address in the data memory unit 6 C, a block comprising multiple addresses, or the like.
- the power of radio waves from the communication device is sufficiently high for the reception sensitivity of the second antenna unit 7 .
- the first and second antenna units then send the extracted power to the control unit 5 .
- the present invention lets the RFID tag have the external power input unit 12 , and controls permission and inhibition of access from a communication device to the memory unit 6 in accordance with the presence/absence of external power from the external power input unit 12 .
- This makes it possible to prevent malicious access from a long distance by providing the second antenna unit 7 and the connection terminal 11 to the external power supply without physically removing part of an antenna.
- the present invention controls permission and inhibition of access from a communication device to the protected memory unit 6 A and access to a data storage area in the data memory unit 6 C which is in protected state. This makes it possible to properly protect only data requiring protection against malicious access from a long distance and allow access from a long distance to data requiring no protection, thereby improving convenience.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Electromagnetism (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Near-Field Transmission Systems (AREA)
Abstract
An RFID tag includes an external power input unit, first antenna unit, first power supply unit, memory unit, and control unit. The external power input unit inputs external power. The first antenna unit receives power from a communication device. The first power supply unit extracts power from the radio wave received by the first antenna unit. The control unit operates upon receiving power from the first power supply unit and controls permission and inhibition of access from the communication device to the memory unit in accordance with presence/absence of input of power from the external power input unit.
Description
- The present invention relates to an RFID (Radio Frequency Identification) tag which performs data communication with a communication device such as a reader or a reader/writer through radio waves.
- Recently, RFID has rapidly become popular as an automatic identification technique using radio communication. A general RFID system comprises an RFID tag, which is attached to an article to identify it, and a reader/writer (RFID reader/writer), which is used to read out data stored in a memory in the RFID tag or write data in the memory in the RFID tag.
- One of the features of RFID technique is contactless access to tag memory. This feature makes it possible to read/write data from/in tag memory even when multiple articles, each of which is attached an RFID tag, are packed in a box without unpacking it. This technique can improve the efficiency of various business processes such as article receiving and shipping, and hence is expected to be applied to various supply chain processes.
- RFID technique using UHF (Ultra High Frequency) band allows access to tag memory from a longer distance than using microwave band or HF (High Frequency) band. With this feature, higher expectations have been placed on using UHF band.
- Since RFID technique allows contactless access to tag memory, it is possible that a malicious user reads/rewrites data from/in the RFID tag without letting the owner or authorized user of the RFID tag consent to or notice it. This may pose serious problems in terms of privacy protection and information security.
- Since RFID using UHF band allows access to memory of an RFID tag even if an RFID reader/writer is considerably distant from the RFID tag, it is difficult for the owner to notice unauthorized access, posing a serious problem.
- In order to cope with such a problem, for example, reference 1 (G. Karjoth and P. Moskowitz, “Disabling RFID tags with Visible Confirmation: Clipped Tags Are Silenced”, In Proceedings of Workshop on Privacy in the Electronic Society, November 2005.) discloses an RFID tag which prevents unwanted access by physically removing some part of an antenna of the RFID tag so as to disable access to the memory from a long distance.
- The method disclosed in
reference 1, however, physically breaks part of an RFID tag, and hence it is difficult to restore the tag to its initial unbroken state afterward. In addition, assume that the memory of an RFID tag stores both data to be protected against unauthorized access and data which does not require such protection. In this case, this technique disables access from long distance to the data which does not require protection. This may degrade convenience in using RFID. - The present invention has been made to solve this problem, and has as its objective to provide an RFID tag which can prevent unauthorized access from a long distance without physically removing part of an antenna.
- It is another objective of the present invention to provide an RFID tag with high convenience which can prevent unauthorized access from a long distance without physically removing part of an antenna, properly protects only data requiring protection against long-distance unauthorized access, and allows long-distance access to data which requires no protection.
- In order to achieve the above objectives, according to the present invention, there is provided an RFID tag comprising an external power input unit which inputs external power, a first antenna unit which receives power from a communication device, a first power supply unit which extracts power from the radio wave received by the first antenna unit, a memory unit, and a control unit which operates upon receiving power from the first power supply unit and controls permission and inhibition of access from the communication device to the memory unit in accordance with presence/absence of input of power from the external power input unit.
-
FIG. 1 is a block diagram showing the schematic arrangement of an RFID tag according to the first embodiment of the present invention; -
FIG. 2 is a block diagram showing the arrangement of the control unit of the RFID tag according to the first embodiment; -
FIG. 3 is a flowchart for explaining the access inhibition/permission function of the control unit of the RFID tag according to the first embodiment; -
FIG. 4 is a view for explaining the operation of the RFID tag in a case wherein an RFID reader/writer is located at a long distance from the RFID tag; -
FIG. 5 is a view for explaining the operation of the RFID tag in a case wherein the RFID reader/writer is located at a short distance from the RFID tag; -
FIG. 6 is a block diagram showing the second embodiment as a modification of the first embodiment; -
FIG. 7 is a view showing how an RFID tag according to the second embodiment is used; -
FIG. 8 is a block diagram showing the schematic arrangement of an RFID tag according to the third embodiment of the present invention; -
FIG. 9 is a block diagram showing the arrangement of the control unit of the RFID tag according to the third embodiment; -
FIG. 10 is a flowchart for explaining the access inhibition/permission function of the control unit of the RFID tag according to the third embodiment; -
FIG. 11 is a view for explaining the operation of the RFID tag in a case wherein an RFID reader/writer is located at a long distance from the RFID tag; -
FIG. 12 is a view for explaining the operation of the RFID tag in a case wherein the RFID reader/writer is located at a short distance from the RFID tag; -
FIG. 13 is a block diagram showing the fourth embodiment as a modification of the third embodiment; -
FIG. 14 is a block diagram showing the schematic arrangement of an RFID tag according to the fifth embodiment of the present invention; -
FIG. 15 is a view showing the relationship between the respective addresses in a data memory unit and the flag values in a flag memory unit in an RFID tag according to the fifth embodiment; -
FIG. 16 is a block diagram showing the arrangement of the control unit of the RFID tag according to the fifth embodiment; -
FIG. 17 is a flowchart for explaining the access inhibition/permission function of the control unit of the RFID according to the fifth embodiment; -
FIG. 18 is a view for explaining the operation of the RFID tag in a case wherein an RFID reader/writer is located at a long distance from the RFID tag; -
FIG. 19 is a view for explaining the operation of the RFID tag in a case wherein the RFID reader/writer is located at a short distance from the RFID tag; -
FIG. 20 is a block diagram showing the sixth embodiment as a modification of the fifth embodiment; -
FIG. 21 is a block diagram showing the schematic arrangement of an RFID tag according to the seventh embodiment of the present invention; -
FIG. 22 is a block diagram showing the arrangement of a control unit for the RFID tag according to the seventh embodiment; -
FIG. 23 is a flowchart for explaining the access inhibition/permission function of the control unit according to the seventh embodiment; -
FIG. 24 is a view for explaining the operation of an RFID tag in a case wherein an RFID reader/writer is located at a long distance from the RFID tag; -
FIG. 25 is a view for explaining the operation of the RFID tag in a case wherein the RFID reader/writer is located at a short distance from the RFID tag; -
FIG. 26 is a block diagram showing the eighth embodiment as a modification of the seventh embodiment; -
FIG. 27 is a view showing how an RFID tag according to the eighth embodiment is used; -
FIG. 28 is a block diagram showing the schematic arrangement of an RFID tag according to the ninth embodiment of the present invention; and -
FIG. 29 is a view showing how the RFID tag according to the ninth embodiment is used. - The present invention will be described in detail below with reference to the accompanying drawings.
-
FIG. 1 shows the schematic arrangement of an RFID tag according to the first embodiment of the present invention. As shown inFIG. 1 , anRFID tag 101 according to the first embodiment comprises afirst antenna unit 1 which transmits/receives radio waves to/from an RFID reader/writer 200, a firstpower supply unit 2 which extracts power from the radio wave received by thefirst antenna unit 1, adata reception unit 3 which decodes a command contained in the radio wave received by thefirst antenna unit 1 and transmits the resultant data to acontrol unit 5, adata transmission unit 4 which encodes the return data transmitted from thecontrol unit 5 in a transmission radio wave from thefirst antenna unit 1, thecontrol unit 5 which interprets the command contained in the radio wave received by thefirst antenna unit 1 and accesses amemory unit 6, thememory unit 6 which stores an ID, user data, and the like and an externalpower input unit 12 which inputs external power. The externalpower input unit 12 comprises asecond antenna unit 7 having lower radio wave reception sensitivity than thefirst antenna unit 1, and a secondpower supply unit 8 which extracts power from the radio wave received by thesecond antenna unit 7. - In the
RFID tag 101, thefirst antenna unit 1 and thesecond antenna unit 7 use the same frequency band for communication. Letting L1 be the communicable distance of thefirst antenna unit 1, and L2 be the communicable distance of radio waves from thesecond antenna unit 7, the size of thesecond antenna unit 7 is set to be sufficiently smaller than that of thefirst antenna unit 1 so as to set the communicable distance L1 of thefirst antenna unit 1 to a long distance and set the communicable distance L2 of radio waves from thesecond antenna unit 7 to a short distance. - In the
RFID tag 101, thecontrol unit 5 operates upon receiving power from the firstpower supply unit 2. Thecontrol unit 5 has, as a function unique to this embodiment, an access inhibition/permission function of inhibiting and permitting access to thememory unit 6 on the basis of whether power (external power) is input from the secondpower supply unit 8. More specifically, as shown inFIG. 2 , thecontrol unit 5 has two functional units, i.e., anaccess inhibition unit 5A which inhibits access from the RFID reader/writer 200 to thememory unit 6 through thefirst antenna unit 1 if no power is received from the secondpower supply unit 8, and anaccess permission unit 5B which permits access from the RFID reader/writer 200 to thememory unit 6 through thefirst antenna unit 1 if power is received from the secondpower supply unit 8. The access inhibition/permission function of thecontrol unit 5 will be described with reference to the flowchart shown inFIG. 3 . - Assume that as shown in
FIG. 4 , the RFID reader/writer 200 is located at along distance (between L1 and L2). In this case, thefirst antenna unit 1 of theRFID tag 101 receives a radio wave from the RFID reader/writer 200, and the firstpower supply unit 2 supplies power extracted from the radio wave received by thefirst antenna unit 1 to thecontrol unit 5. Thecontrol unit 5 operates upon receiving the power from the firstpower supply unit 2, and checks whether the command contained in the radio wave received by thefirst antenna unit 1 is a data access request (step S101). - If the command from the RFID reader/
writer 200 is an access request (YES in step S101), thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S102). If no power is supplied from the second power supply unit 8 (NO in step S102), the process advances to step S109. If power is supplied from the second power supply unit 8 (YES in step S102), the process advances to step S103. - In this case, since the RFID reader/
writer 200 is located between L1 and L2, the power of radio waves from the RFID reader/writer 200 is not sufficient for the reception sensitivity of thesecond antenna unit 7. The secondpower supply unit 8 cannot therefore extract power, and supplies no power to thecontrol unit 5. For this reason, in accordance with NO in step S102, thecontrol unit 5 advances to step S109 to inhibit access to thememory unit 6 which is based on the data access request received in step S101 and transmit an error response to the RFID reader/writer 200 through the data transmission unit 4 (step S110). - In this case, the RFID reader/
writer 200 may not be an authorized communication device but may be a malicious communication device. The first embodiment inhibits access from the RFID reader/writer 200 at a long distance to thememory unit 6 in theRFID tag 101 regardless of whether the RFID reader/writer 200 is an authorized communication device. This prevents malicious access from a long distance. - Assume that as shown in
FIG. 5 , the RFID reader/writer 200 is located at a short distance (within L2). In this case, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7 of theRFID tag 101. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1, and makes the secondpower supply unit 8 extract power from the radio wave received by thesecond antenna unit 7. The first and second power supply units then send the extracted power to thecontrol unit 5. - The
control unit 5 operates upon receiving the power from the firstpower supply unit 2, and checks whether the command contained in the radio wave received by thefirst antenna unit 1 is a data access request (step S101). If the command is a data access request (YES in step S101), thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S102). If no power is supplied from the secondpower supply unit 8, the process advances to step S109. If power is supplied from the secondpower supply unit 8, the process advances to step S103. - In this case, since the RFID reader/
writer 200 is located within L2, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7, and the secondpower supply unit 8 supplies power to thecontrol unit 5. Therefore, in accordance with YES in step S102, thecontrol unit 5 advances to step S103 to permit access to thememory unit 6 which is based on the data access request received in step S101. Thecontrol unit 5 then checks whether the data access request is a data read request or data write request (step S104). - If the data access request is a data read request, the
control unit 5 reads out the request data from the memory unit 6 (step S105), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S106). - If the data access request is a data write request, the
control unit 5 writes the received data in the memory unit 6 (step S107), and returns a response indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S108). - Note that the
access inhibition unit 5A of thecontrol unit 5 performs the processing in step S109 if NO in step S102, and theaccess permission unit 5B performs the processing in step S103 if YES in step S102. - In this case, the RFID reader/
writer 200 may not be an authorized communication device but may be a malicious communication device. The first embodiment permits access from the RFID reader/writer 200 at a short distance to thememory unit 6 in theRFID tag 101 regardless of whether the RFID reader/writer 200 is an authorized communication device. Even if some person has made malicious access, since such access must be made from a short distance, the user of the RFID tag can easily visually check the access. This can prevent any person from making malicious access without letting the user of theRFID tag 101 consent to or notice it. - The
RFID tag 101 shown inFIG. 1 is configured such that thefirst antenna unit 1 and thesecond antenna unit 7 use the same frequency band for communication. However, the frequency band of thefirst antenna unit 1 may differ from that of thesecond antenna unit 7, and theRFID tag 101 may include another radio wave source to thesecond antenna unit 7. - For example, as shown in
FIG. 6 , the frequency band of afirst antenna unit 1 is made to differ from that of asecond antenna unit 7, and aradio wave source 300 is provided for thesecond antenna unit 7 independently of an RFID reader/writer 200. - According to an
RFID tag 10′, when theradio wave source 300 is located within a communicable distance L2 of thesecond antenna unit 7, thesecond antenna unit 7 receives a radio wave from theradio wave source 300. Since the power of the received radio wave is sufficiently high for the reception sensitivity of thesecond antenna unit 7, and hence a secondpower supply unit 8 extracts power from the received radio wave. This makes acontrol unit 5 permit access from the RFID reader/writer 200 to amemory unit 6. - According to the second embodiment, using the
radio wave source 300 allows access from the RFID reader/writer 200 to thememory unit 6 in theRFID tag 101′ regardless of whether the RFID reader/writer 200 is an authorized communication device. Since theradio wave source 300 must be brought close to theRFID tag 101′, the user can easily visually check malicious access.FIG. 7 shows how the user uses theRFID tag 101′. - In the first embodiment, all the data stored in the
memory unit 6 are protected from malicious access. However, it is conceivable that some data require no protection depending on the type of data. The third embodiment, therefore, sets only data requiring protection as a target for unauthorized access prevention by switching memory units for storage depending on the type of data, thereby further improving the convenience in using data. -
FIG. 8 shows the schematic arrangement of an RFID tag according to the third embodiment of the present invention. AnRFID tag 102 of the third embodiment has an arrangement in which amemory unit 6 is divided into a protectedmemory unit 6A and anunprotected memory unit 6B. The protectedmemory unit 6A stores data which need protection. Theunprotected memory unit 6B stores data which do not need protection. Acontrol unit 5 comprises two functional units, i.e., anaccess inhibition unit 5C which inhibits access from an RFID reader/writer 200 to the protectedmemory unit 6A through afirst antenna unit 1 if no power is received from a secondpower supply unit 8, and anaccess permission unit 5D which permits access from the RFID reader/writer 200 to the protectedmemory unit 6A through thefirst antenna unit 1 if power is received from the secondpower supply unit 8. The access inhibition/permission function of thecontrol unit 5 of theRFID tag 102 according to the third embodiment will be described with reference to the flowchart shown inFIG. 10 . - Assume that as shown in
FIG. 11 , the RFID reader/writer 200 is located at a long distance (between L1 and L2). In this case, thefirst antenna unit 1 of theRFID tag 102 receives a radio wave from the RFID reader/writer 200, and a firstpower supply unit 2 supplies power extracted from the radio wave received by thefirst antenna unit 1 to thecontrol unit 5. Thecontrol unit 5 operates upon receiving the power from the firstpower supply unit 2, and checks whether the command contained in the radio wave received by thefirst antenna unit 1 is a data access request (step S201). - If the command from the RFID reader/
writer 200 is a data access request (YES in step S201), thecontrol unit 5 checks whether the command is an access request to the protectedmemory unit 6A (step S202). If the command is an access request to the protectedmemory unit 6A (YES in step S202), the process advances to step S203. If the command is not an access request to the protectedmemory unit 6A (NO in step S202), the process advances to step S205. - If the command is an access request to the protected
memory unit 6A (YES in step S202), thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S203). If no power is supplied from the second power supply unit 8 (NO in step S203), the process advances to step S210. If power is supplied from the second power supply unit 8 (YES in step S203), the process advances to step S204. - In this case, since the RFID reader/
writer 200 is located between L1 and L2, the radio field intensity from the RFID reader/writer 200 is insufficient for the reception sensitivity of asecond antenna unit 7. Therefore, the secondpower supply unit 8 cannot extract power, and hence the secondpower supply unit 8 sends no power to thecontrol unit 5. In accordance with NO in step S203, thecontrol unit 5 advances to step S210 to inhibit access to the protectedmemory unit 6A which is based on the data access request received in step S201 and transmit an error response to the RFID reader/writer 200 through a data transmission unit 4 (step S211). - If the command is not an access request to the protected
memory unit 6A (NO in step S202), thecontrol unit 5 determines that the command is an access request to theunprotected memory unit 6B, and checks whether the access request is a data read request or a data write request (step S205). - If the access request is a data read request, the
control unit 5 reads out requested data from theunprotected memory unit 6B (step S206), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S207). - If the access request is a data write request, the
control unit 5 writes the received data in theunprotected memory unit 6B (step S208), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S209). - In this case, the RFID reader/
writer 200 may not be an authorized communication device but may be a malicious communication device. The third embodiment permits access from the RFID reader/writer 200 at a long distance to theunprotected memory unit 6B in theRFID tag 102 regardless of whether the RFID reader/writer 200 is an authorized communication device. - However, the embodiment inhibits access to the protected
memory unit 6A. This allows access from a long distance to data requiring no protection and can properly protect only data requiring protection against unauthorized access from a long distance. - Assume that as shown in
FIG. 12 , the RFID reader/writer 200 is located at a short distance (within L2). In this case, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7 of theRFID tag 102. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1, and makes the secondpower supply unit 8 extract power from the radio wave received by thesecond antenna unit 7. The first and second power supply units then send the extracted power to thecontrol unit 5. Thecontrol unit 5 operates upon receiving power from the firstpower supply unit 2, and checks whether the command contained in the power received by thefirst antenna unit 1 is a data access request (step S201). - If the command from the RFID reader/
writer 200 is a data access request (YES in step S201), thecontrol unit 5 checks whether the command is an access request to the protectedmemory unit 6A (step S202). If the command is an access request to the protectedmemory unit 6A (YES in step S202), the process advances to step S203. If the command is not an access request to the protectedmemory unit 6A (NO in step S202), the process advances to step S205. - If the command is an access request to the protected
memory unit 6A (YES in step S202), thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S203). If no power is supplied from the second power supply unit 8 (NO in step S203), the process advances to step S210. If power is supplied from the second power supply unit 8 (YES in step S203), the process advances to step S204. In this case, since the RFID reader/writer 200 is located within L2, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7, and the secondpower supply unit 8 supplies power to thecontrol unit 5. Therefore, in accordance with YES in step S203, thecontrol unit 5 advances to step S204 to permit access to the protectedmemory unit 6A which is based on the data access request received in step S201. Thecontrol unit 5 then checks whether the data access request to the protectedmemory unit 6A is a data read request or data write request (step S205). - If the data access request is a data read request, the
control unit 5 reads out the request data from the protectedmemory unit 6A (step S206), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S207). - If the data access request is a data write request, the
control unit 5 writes the received data in the protectedmemory unit 6A (step S208), and returns a response indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S209). - Note that the
access inhibition unit 5C of thecontrol unit 5 performs the processing in step S210 if NO in step S203, and theaccess permission unit 5D performs the processing in step S204 if YES in step S203. - In this case, the RFID reader/
writer 200 may not be an authorized communication device but may be a malicious communication device. The third embodiment permits access from the RFID reader/writer 200 at a short distance to the protectedmemory unit 6A in theRFID tag 102 regardless of whether the RFID reader/writer 200 is an authorized communication device. Even if some person has made malicious access, since such access must be made from a short distance, the user of an RFID tag can easily visually check the access. This can prevent any person from making malicious access without letting the user of theRFID tag 102 consent to or notice it. - The
RFID tag 102 shown inFIG. 8 is configured such that thefirst antenna unit 1 and thesecond antenna unit 7 use the same frequency band for communication. However, the frequency band of thefirst antenna unit 1 may differ from that of thesecond antenna unit 7, and theRFID tag 102 may include another radio wave source to thesecond antenna unit 7. - For example, as shown in
FIG. 13 , the frequency band of afirst antenna unit 1 is made to differ from that of asecond antenna unit 7, and aradio wave source 300 is provided for thesecond antenna unit 7 independently of an RFID reader/writer 200. - According to an
RFID tag 102′, when theradio wave source 300 is located within a communicable distance L2 of thesecond antenna unit 7, thesecond antenna unit 7 receives a radio wave from theradio wave source 300. Since the radio field intensity of the received radio wave is sufficiently high for the reception sensitivity of thesecond antenna unit 7, and hence a secondpower supply unit 8 extracts power from the received radio wave. This makes acontrol unit 5 permit access from the RFID reader/writer 200 to a protectedmemory unit 6A. - According to the fourth embodiment, using the
radio wave source 300 allows access from the RFID reader/writer 200 to the protectedmemory unit 6A in theRFID tag 102′ regardless of whether the RFID reader/writer 200 is an authorized communication device. Since theradio wave source 300 must be brought close to theRFID tag 102′, the user can easily visually check malicious access. - In the first embodiment, all the data stored in the
memory unit 6 are protection targets. However, it is conceivable that some data requires no protection depending on the type of data. The fifth embodiment, therefore, sets only data requiring protection as a target for unauthorized access prevention by designating permission/inhibition of data read access and data write access to corresponding addresses in the data memory unit by using flag values in a flag memory unit, thereby further improving the convenience in using data. -
FIG. 14 shows the schematic arrangement of an RFID tag according to the fifth embodiment of the present invention. AnRFID tag 103 of the fifth embodiment has an arrangement in which amemory unit 6 is divided into adata memory unit 6C and aflag memory unit 6D. Thedata memory unit 6C stores an ID, user data, and the like. Theflag memory unit 6D stores flag values indicating whether data stored at the addresses in thedata memory 6C need protection. -
FIG. 15 shows the relationship between the respective addresses in thedata memory unit 6C and the flag values in theflag memory unit 6D. Thedata memory unit 6C and theflag memory unit 6D have the same address arrangement. At the respective addresses in theflag memory unit 6D, flag values designating permission/inhibition (protection/no protection) of data write access and data read access to the corresponding addresses in thedata memory unit 6C are stored. In this embodiment, a flag value of “1” represents a protected state, and a flag value of “0” represents an unprotected state. With this setting, as indicated by the hatchings in thedata memory unit 6C, addresses, of the addresses in thedata memory unit 6C, at which the flag value “1” is stored in theflag memory unit 6D are set as addresses in the protected state. - This example designates protection/no protection for each address in the
data memory unit 6C. It is also possible to divide thedata memory unit 6C into blocks each comprising multiple addresses and designate protection/no protection for each block in theflag memory unit 6D. - As shown in
FIG. 16 , acontrol unit 5 has two functional units, i.e., anaccess inhibition unit 5E and anaccess permission unit 5F. Theaccess inhibition unit 5E inhibits access from an RFID reader/writer 200 to theflag memory unit 6D through afirst antenna unit 1 if no power is received from a secondpower supply unit 8, and also inhibits access from the RFID reader/writer 200 to a data storage area in thedata memory unit 6C, which is in protected state by a flag value in theflag memory unit 6D, through thefirst antenna unit 1. Theaccess permission unit 5F permits access from the RFID reader/writer 200 to theflag memory unit 6D through thefirst antenna unit 1 if power is received from the secondpower supply unit 8, and also permits access from the RFID reader/writer 200 to a data storage area in thedata memory unit 6C, which is in protected state by a flag value in theflag memory unit 6D, through thefirst antenna unit 1. - The access inhibition/permission function of the
control unit 5 of theRFID tag 103 according to the fifth embodiment will be described below with reference to the flowchart shown inFIG. 17 . - Assume that as shown in
FIG. 18 , the RFID reader/writer 200 is located at a long distance (between L1 and L2). In this case, afirst antenna unit 1 of anRFID tag 102 receives a radio wave from the RFID reader/writer 200, and a firstpower supply unit 2 supplies power extracted from the radio wave received by thefirst antenna unit 1 to thecontrol unit 5. Thecontrol unit 5 operates upon receiving the power from the firstpower supply unit 2, and checks whether the command contained in the radio wave received by thefirst antenna unit 1 is a data access request (step S301). - If the command from the RFID reader/
writer 200 is a data access request (YES in step S301), thecontrol unit 5 checks whether the command is an access request to thedata memory unit 6C or an access request to theflag memory unit 6D (step S302). If the command is an access request to thedata memory unit 6C, the process advances to step S303. If the command is an access request to theflag memory unit 6D, the process advances to step S304. - If the command is an access request to the
flag memory unit 6D, thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S304). If no power is supplied from the second power supply unit 8 (NO in step S304), the process advances to step S311. If power is supplied from the second power supply unit 8 (YES in step S304), the process advances to step S305. - In this case, since the RFID reader/
writer 200 is located between L1 and L2, the power of radio waves from the RFID reader/writer 200 is insufficient for the reception sensitivity of asecond antenna unit 7. Therefore, the secondpower supply unit 8 cannot extract power, and hence sends no power to thecontrol unit 5. In accordance with NO in step S304, thecontrol unit 5 advances to step S311 to inhibit access to theflag memory unit 6D which is based on the data access request received in step S301 and transmits an error response to the RFID reader/writer 200 through a data transmission unit 4 (step S312). - If the command is an access request to the
data memory unit 6C, thecontrol unit 5 checks whether the address in thedata memory unit 6C to which the access requested is in the protected state, by accessing the corresponding address in theflag memory unit 6D (step S303). If the address is in the protected state (YES in step S303), the process advances to step S304. If the address in not in the protected state (NO in step S303), the process advances to step S306. - If the address in the
data memory unit 6C to which the access requested is in the protected state (YES in step S303), thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S304). If no power is supplied from the secondpower supply unit 8, the process advances to step S311. If power is supplied from the secondpower supply unit 8, the process advances to step S305. - In this case, since the RFID reader/
writer 200 is located between L1 and L2, the power of radio waves from the RFID reader/writer 200 is insufficient for the reception sensitivity of asecond antenna unit 7. Therefore, the secondpower supply unit 8 cannot extract power, and hence the secondpower supply unit 8 sends no power to thecontrol unit 5. In accordance with NO in step S304, thecontrol unit 5 advances to step S311 to inhibit access to thedata memory unit 6C which is based on the data access request received in step S301 and transmit an error response to the RFID reader/writer 200 through the data transmission unit 4 (step S312). - If the address in the
data memory unit 6C to which the access request is issued is not in the protected state (NO in step S303), thecontrol unit 5 determines that it is possible to access thedata memory unit 6C, and checks whether the access request is a data read request or a data write request (step S306). - If the access request is a data read request, the
control unit 5 reads out the requested data from thedata memory unit 6C (step S307), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S308). - If the access request is a data write request, the
control unit 5 writes the received data in thedata memory unit 6C (step S309), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S310). - In this case, the RFID reader/
writer 200 may not be an authorized communication device but may be a malicious communication device. The fifth embodiment permits access from the RFID reader/writer 200 at a long distance to an unprotected address in thedata memory unit 6C in theRFID tag 102 and inhibits access to a protected address regardless of whether the RFID reader/writer 200 is an authorized communication device. This allows access from a long distance to data requiring no protection and can properly protect only data requiring protection against unauthorized access from a long distance. - In addition, the fifth embodiment inhibits access from the RFID reader/
writer 200 at a long distance to theflag memory unit 6D regardless of whether the RFID reader/writer 200 is an authorized communication device. This eliminates the possibility of malicious rewriting the designation of a protected state or an unprotected state with respect to the address in thedata memory unit 6C. - Assume that as shown in
FIG. 19 , the RFID reader/writer 200 is located at a short distance (within L2). In this case, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7 of theRFID tag 102. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1, and makes the secondpower supply unit 8 extract power from the radio wave received by thesecond antenna unit 7. The first and second power supply units then send the extracted power to thecontrol unit 5. Thecontrol unit 5 operates upon receiving the power from the firstpower supply unit 2, and checks whether the command contained in the radio wave received by thefirst antenna unit 1 is a data access request (step S301). - If the command from the RFID reader/
writer 200 is a data access request (YES in step S301), thecontrol unit 5 checks whether the command is an access request to thedata memory unit 6C or an access request to theflag memory unit 6D (step S302). If the command is an access request to thedata memory unit 6C, the process advances to step S303. If the command is an access request to theflag memory unit 6D, the process advances to step S304. - If the command is an access request to the
flag memory unit 6D, thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S304). If no power is supplied from the second power supply unit 8 (NO in step S304), the process advances to step S311. If power is supplied from the second power supply unit 8 (YES in step S304), the process advances to step S305. - In this case, since the RFID reader/
writer 200 is located within L2, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7, and thecontrol unit 5 receives power from the secondpower supply unit 8. For this reason, in accordance with YES in step S304, thecontrol unit 5 advances to step S305 to permit access to theflag memory unit 6D which is based on the data access request received in step S301. Thecontrol unit 5 then checks whether the access request to theflag memory unit 6D is a data read request or a data write request (step S306). - If the access request is a data read request, the
control unit 5 reads out the requested data from thedata memory unit 6C (step S307), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S308). - If the access request is a data write request, the
control unit 5 writes the received data in theflag memory unit 6D (step S309), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S310). - If the command is an access request to the
data memory unit 6C, thecontrol unit 5 checks whether the address in thedata memory unit 6C to which the access requested is in the protected state, by accessing the corresponding address in theflag memory unit 6D (step S303). If the address is in the protected state (YES in step S303), the process advances to step S304. If the address in not in the protected state (NO in step S303), the process advances to step S306. - If the address in the
data memory unit 6C to which the access requested is in the protected state (YES in step S303), thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S304). If no power is supplied from the secondpower supply unit 8, the process advances to step S311. If power is supplied from the second power supply unit 8 (YES in step S304), the process advances to step S305. - In this case, since the RFID reader/
writer 200 is located within L2, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7, and the secondpower supply unit 8 supplies power to thecontrol unit 5. Therefore, in accordance with YES in step S304, thecontrol unit 5 advances to step S305 to permit access to thedata memory unit 6C which is based on the data access request received in step S301. Thecontrol unit 5 then checks whether the access request to thedata memory unit 6C is a data read request or data write request (step S306). - If the access request is a data read request, the
control unit 5 reads out the requested data from theaccess inhibition unit 5C (step S307), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S308). - If the access request is a data write request, the
control unit 5 writes the received data in thedata memory unit 6C (step S309), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S310). - If the address in the
data memory unit 6C to which the access requested is not in the protected state (NO in step S303), thecontrol unit 5 checks whether the access request is a data read request or a data write request (step S306). Thecontrol unit 5 performs read processing (steps S307 and S308) of data from thedata memory unit 6C or write processing (steps S309 and S310) of data in thedata memory unit 6C in accordance with the check result. - Note that the
access inhibition unit 5E of thecontrol unit 5 performs the processing in step S311 if NO in step S304, and theaccess permission unit 5D performs the processing in step S305 if YES in step S304. - In this case, the RFID reader/
writer 200 may not be an authorized communication device but may be a malicious communication device. The fifth embodiment permits all access from the RFID reader/writer 200 at a short distance to thedata memory unit 6C in theRFID tag 103 regardless of whether the RFID reader/writer 200 is an authorized communication device and the accessed data is the protected state/unprotected state. This embodiment also permits access to theflag memory unit 6D in theRFID tag 103. Even if some person has made malicious access, since such access must be made from a short distance, the user of an RFID tag can easily visually check the access. This can prevent any person from making malicious access without letting the user of theRFID tag 103 consent to or notice it. - The
RFID tag 103 shown inFIG. 14 is configured such that thefirst antenna unit 1 and thesecond antenna unit 7 use the same frequency band for communication. However, the frequency band of thefirst antenna unit 1 may differ from that of thesecond antenna unit 7, and theRFID tag 103 may include another radio wave source to thesecond antenna unit 7. - For example, as shown in
FIG. 20 , the frequency band of afirst antenna unit 1 is made to differ from that of asecond antenna unit 7, and aradio wave source 300 is provided for thesecond antenna unit 7 independently of an RFID reader/writer 200. - According to an
RFID tag 103′, when theradio wave source 300 is located within a communicable distance L2 of thesecond antenna unit 7, thesecond antenna unit 7 receives a radio wave from theradio wave source 300. Since the power of the received radio wave is sufficiently high for the reception sensitivity of thesecond antenna unit 7, a secondpower supply unit 8 extracts power from the received radio wave. This makes acontrol unit 5 permit access from the RFID reader/writer 200 to a protected address in adata memory unit 6C. - According to the sixth embodiment, using the
radio wave source 300 allows access from the RFID reader/writer 200 to a protected address in thedata memory unit 6C in theRFID tag 103′ regardless of whether the RFID reader/writer 200 is an authorized communication device. Since theradio wave source 300 must be brought close to theRFID tag 103′, the user can easily visually check malicious access. - The third embodiment uses the
second antenna unit 7 and the secondpower supply unit 8 only for the purpose of determining whether to permit access from the RFID reader/writer 200 to the protectedmemory unit 6A through thefirst antenna unit 1, and cannot perform data communication through thesecond antenna unit 7. The seventh embodiment therefore includes a second data reception unit and a second data transmission unit for asecond antenna unit 7 to allow data communication through thesecond antenna unit 7, thereby further improving the convenience in using data. -
FIG. 21 shows the schematic arrangement of an RFID tag according to the seventh embodiment of the present invention. AnRFID tag 104 according to the seventh embodiment is obtained by partially changing the arrangement of theRFID tag 102 according to the third embodiment. That is, this embodiment uses an externalpower input unit 12 not only for the supply of external power but also for data communication with an RFID reader/writer 200. - More specifically, this embodiment includes a
data reception unit 3 and adata transmission unit 4 for afirst antenna unit 1 as a first data reception unit and a first data transmission unit, respectively. In addition, the externalpower input unit 12 includes a seconddata reception unit 9 and a seconddata transmission unit 10 in addition to asecond antenna unit 7 and a secondpower supply unit 8. Like thedata reception unit 3, the seconddata reception unit 9 decodes the command contained in the radio wave received from the RFID reader/writer 200 and transmits the resultant data to acontrol unit 5. Like thedata transmission unit 4, the seconddata transmission unit 10 encodes the return data transmitted from thecontrol unit 5 in a transmission radio wave from thesecond antenna unit 7. - As shown in
FIG. 22 , thecontrol unit 5 comprises two functional units, i.e., anaccess inhibition unit 5G which inhibits access from the RFID reader/writer 200 to a protectedmemory unit 6A through thefirst antenna unit 1 if no power is received from the secondpower supply unit 8, and anaccess permission unit 5H which permits access from the RFID reader/writer 200 to the protectedmemory unit 6A through thesecond antenna unit 7 if power is received from the secondpower supply unit 8. - The access inhibition/permission function of the
control unit 5 of theRFID tag 104 according to the seventh embodiment will be described below with reference to the flowchart shown inFIG. 23 . - Assume that as shown in
FIG. 24 , the RFID reader/writer 200 is located at a long distance (between L1 and L2). In this case, thefirst antenna unit 1 of theRFID tag 102 receives a radio wave from the RFID reader/writer 200, and a firstpower supply unit 2 supplies power extracted from the radio wave received by thefirst antenna unit 1 to thecontrol unit 5. Thecontrol unit 5 operates upon receiving the power from the firstpower supply unit 2, and checks whether the command contained in the radio wave received by thefirst antenna unit 1 is a data access request (step S401). - If the command from the RFID reader/
writer 200 is a data access request (YES in step S401), thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S402). If no power is supplied from the second power supply unit 8 (NO in step S402), the process advances to step S403. If power is supplied from the second power supply unit 8 (YES in step S402), the process advances to step S411. - In this case, since the RFID reader/
writer 200 is located between L1 and L2, the power of radio waves from the RFID reader/writer 200 is insufficient for the reception sensitivity of thesecond antenna unit 7. Therefore, the secondpower supply unit 8 cannot extract power, and hence the secondpower supply unit 8 sends no power to thecontrol unit 5. In accordance with NO in step S402, thecontrol unit 5 advances to step S403 to check whether the data access request received through thefirst antenna unit 1 is an access request to the protectedmemory unit 6A. - If the data access request is an access request to the protected
memory unit 6A (YES in step S403), thecontrol unit 5 inhibits access to the protectedmemory unit 6A which is based on the data access request received in step S401 (step S409), and transmits an error response to the RFID reader/writer 200 through the data transmission unit 4 (step S410). - If the data access request is not an access request to the protected
memory unit 6A (NO in step S403), thecontrol unit 5 determines that the data access request is an access request to theunprotected memory unit 6B, and checks whether the access request is a data read request or a data write request (step S404). - If the access request is a data read request, the
control unit 5 reads out the requested data from anunprotected memory unit 6B (step S405), and returns the readout data to the RFID reader/writer 200 through the data transmission unit 4 (step S406). - If the access request is a data write request, the
control unit 5 writes the first received data in theunprotected memory unit 6B (step S407), and returns information indicating a write success to the RFID reader/writer 200 through the data transmission unit 4 (step S408). - In this case, the RFID reader/
writer 200 may not be an authorized communication device but may be a malicious communication device. The seventh embodiment inhibits access from the RFID reader/writer 200 at a long distance to the protectedmemory unit 6A in theRFID tag 104 regardless of whether the RFID reader/writer 200 is an authorized communication device. This allows access from a long distance to data requiring no protection and can protect only data requiring protection against malicious access from a long distance. - Assume that as shown in
FIG. 25 , the RFID reader/writer 200 is located at a short distance (within L2). In this case, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7 of theRFID tag 104. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1, and makes the secondpower supply unit 8 extract power from the radio wave received by thesecond antenna unit 7. The first and second power supply units then send the extracted power to thecontrol unit 5. Thecontrol unit 5 operates upon receiving power from the firstpower supply unit 2, and checks whether the command contained in the radio wave received by thefirst antenna unit 1 is a data access request (S401). - If the command from the RFID reader/
writer 200 is a data access request (YES in step S401), thecontrol unit 5 checks whether power is supplied from the second power supply unit 8 (step S402). If no power is supplied from the second power supply unit 8 (NO in step S402), the process advances to step S403. If power is supplied from the second power supply unit 8 (YES in step S402), the process advances to step S411. - In this case, since the RFID reader/
writer 200 is located within L2, the power of radio waves from the RFID reader/writer 200 is sufficiently high for the reception sensitivity of thesecond antenna unit 7, and the secondpower supply unit 8 supplies power to thecontrol unit 5. Therefore, in accordance with YES in step S402, thecontrol unit 5 advances to step S411. In step S411, thecontrol unit 5 validates the data access request received through thesecond antenna unit 7, and permits all access to thememory unit 6 including the protectedmemory unit 6A which is based on the data access request. Thecontrol unit 5 then checks whether the access request is a data read request or a data write request (step S412). - If the access request is a data read request, the
control unit 5 reads out the requested data from the memory unit 6 (the protectedmemory unit 6A or theunprotected memory unit 6B) (step S413), and returns the readout data to the RFID reader/writer 200 through the second data transmission unit 10 (step S414). - If the access request is a data write request (“write” in step S412), the
control unit 5 writes the received data in the memory unit 6 (the protectedmemory unit 6A or theunprotected memory unit 6B) (step S415), and returns information indicating a write success to the RFID reader/writer 200 through the second data transmission unit 10 (step S416). - Note that if NO in step S402 and YES in step S403, the
access inhibition unit 5G of thecontrol unit 5 performs the processing in step S409. If YES in step S402, theaccess permission unit 5H performs the processing in step S411. - In this case, the RFID reader/
writer 200 may not be an authorized communication device but may be a malicious communication device. The seventh embodiment permits access from the RFID reader/writer 200 at a short distance to the protectedmemory unit 6A in theRFID tag 104 regardless of whether the RFID reader/writer 200 is an authorized communication device. Even if some person has made malicious access, since such access must be made from a short distance, the user of an RFID tag can easily visually check the access. This can prevent any person from making malicious access without letting the user of theRFID tag 104 consent to or notice it. - The
RFID tag 103 according to the fifth embodiment shown inFIG. 14 can have the same effect as that of the seventh embodiment by having thesecond antenna unit 7, secondpower supply unit 8, seconddata reception unit 9, and seconddata transmission unit 10. In this case, anaccess inhibition unit 5E of thecontrol unit 5 in theRFID tag 103 of the fifth embodiment inhibits access from the RFID reader/writer 200 to aflag memory unit 6D through thefirst antenna unit 1 if no power is received from the secondpower supply unit 8, and also inhibits access from the RFID reader/writer 200 to the data storage area in adata memory unit 6C, which is in protected state by a flag value in theflag memory unit 6D, through thefirst antenna unit 1. If power is received from the secondpower supply unit 8, anaccess permission unit 5F permits access from the RFID reader/writer 200 to theflag memory unit 6D through thesecond antenna unit 7 if power is received from the secondpower supply unit 8, and also permits access from the RFID reader/writer 200 to the data storage area in thedata memory unit 6C, which is in protected state by a flag value in theflag memory unit 6D, through thesecond antenna unit 7. - The
RFID tag 104 shown inFIG. 21 is configured such that thefirst antenna unit 1 and thesecond antenna unit 7 use the same frequency band for communication. However, the frequency band of thefirst antenna unit 1 may differ from that of thesecond antenna unit 7, and theRFID tag 104 may include another RFID reader/writer which performs data communication through thesecond antenna unit 7. - For example, as shown in
FIG. 26 , the frequency band of afirst antenna unit 1 is made to differ from that of asecond antenna unit 7, and this embodiment includes a second RFID reader/writer 400 which performs data communication through thesecond antenna unit 7 separately from an RFID reader/writer 200 which performs data communication through thefirst antenna unit 1. - According to an
RFID tag 104′, when the second RFID reader/writer 400 is located within a communicable distance L2 of thesecond antenna unit 7, thesecond antenna unit 7 receives a radio wave from the second RFID reader/writer 400. Since the power of the received radio wave is sufficiently high for the reception sensitivity of thesecond antenna unit 7, a secondpower supply unit 8 extracts power from the received radio wave. This makes acontrol unit 5 validate the data access request received through thesecond antenna unit 7, and allows all access from the second RFID reader/writer 400 to amemory unit 6 including a protectedmemory unit 6A. - According to the eighth embodiment, using the second RFID reader/
writer 400 allows access to the protectedmemory unit 6A in theRFID tag 104′ regardless of whether the RFID reader/writer 200 is an authorized communication device. Since the RFID reader/writer 400 must be brought close to theRFID tag 104′, the user can easily visually check malicious access.FIG. 27 shows how the user uses theRFID tag 104′. -
FIG. 28 shows the schematic arrangement of an RFID tag according to the ninth embodiment of the present invention. AnRFID tag 105 of the ninth embodiment comprises aconnection terminal 11 to anexternal power supply 500 instead of thesecond antenna unit 7 and the secondpower supply unit 8 as external power input units as compared with theRFID tag 101 of the first embodiment. - The first embodiment extracts external power from the radio wave received through the
second antenna unit 7, and thecontrol unit 5 determines, in accordance with the presence/absence of input of the extracted external power, whether to permit/inhibit access to thememory unit 6. In the ninth embodiment, acontrol unit 5 determines, in accordance with the presence/absence of input of external power from theconnection terminal 11, whether to permit/inhibit access to amemory unit 6. The arrangement of thecontrol unit 5 in the ninth embodiment is the same as that of the first embodiment, and a description thereof will be omitted. - The ninth embodiment includes the
external power supply 500 in an RFID reader/writer 200. With this arrangement, theexternal power supply 500 does not connect to theconnection terminal 11 unless theRFID tag 105 has physical contact with the RFID reader/writer 200, thereby preventing malicious contactless access. Even if some person has made malicious access, since such access must be made by making a malicious RFID reader/writer have physical contact with an RFID tag, the user can easily visually check the access. - Note that the operation of the ninth embodiment is the same as that of the flowchart shown in
FIG. 3 except that “IS POWER SUPPLIED FROM SECOND POWER SUPPLY UNIT?” in step S102 is replaced with “IS POWER SUPPLIED FROM CONNECTION TERMINAL?”, and hence a description thereof will be omitted.FIG. 29 shows how theRFID tag 105 is used. - Although the ninth embodiment provides the
external power supply 500 for the RFID reader/writer 200, theexternal power supply 500 can be provided outside of the RFID reader/writer 200. - Letting the RFID tag 102 (
FIG. 8 ) of the third embodiment or the RFID tag 103 (FIG. 14 ) of the fifth embodiment have theconnection terminal 11 for theexternal power supply 500 instead of thesecond antenna unit 7 and the secondpower supply unit 8 as external power input units makes it possible to obtain the same effects as those of theRFID tag 105 of the ninth embodiment. - Each embodiment described above uses the RFID reader/writer capable of reading and writing data as a communication device which performs data communication with an RFID tag. However, each embodiment may use an RFID reader capable of only reading out data as a communication device.
- Reference 2 (Japanese Patent Laid-Open No. 2001-167241) and reference 3 (Japanese Patent Laid-Open No. 2004-213582) disclose arrangements having a second antenna unit provided for an RFID tag, having a second antenna unit smaller in size than a first antenna unit, and the like. Reference 4 (Japanese Patent Laid-Open No. 2003-283366) discloses an arrangement in which a memory unit includes a flag storage unit for indicating protection/no protection of data. However, these references only partially describe part of the features of the present invention, but disclose nothing about important techniques, e.g., controlling permission and inhibition of access from a communication device to a memory unit in accordance with presence/absence of input of external power from the second power supply unit and the connection terminal.
- As described above, the
RFID tag 101 of the present invention includes, as the externalpower input unit 12, thesecond antenna unit 7 having lower radio wave reception sensitivity than thefirst antenna unit 1 and the secondpower supply unit 8 which extracts power from the radio wave received by thesecond antenna unit 7. Thecontrol unit 5 includes anaccess inhibition unit 5A which inhibits access from a communication device to thememory unit 6 through thefirst antenna unit 1 if no power is received from the secondpower supply unit 8, and anaccess permission unit 5B which permits access from the communication device to thememory unit 6 through thefirst antenna unit 1 if power is received from the secondpower supply unit 8. - With this arrangement, when a communication device is located at a long distance from the RFID tag 101 (between the communicable distance of the
first antenna unit 1 and the communicable distance of the second antenna unit 7), thefirst antenna unit 1 of theRFID tag 101 receives a radio wave from the communication device. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1 and send the extracted power to thecontrol unit 5. In this case, however, since the power of radio waves from the communication device is insufficient for the reception sensitivity of thesecond antenna unit 7, the secondpower supply unit 8 cannot extract power, and hence sends no power (external power) to thecontrol unit 5. This inhibits access from the communication device to thememory unit 6 through thefirst antenna unit 1, i.e., access from the communication device at a long distance to thememory unit 6 in theRFID tag 101. This prevents malicious access from a long distance. - In contrast, when the communication device is located at a short distance from the RFID tag 101 (within the communicable distance of the second antenna unit 7), the power of radio waves from the communication device is sufficiently high for the reception sensitivity of the
second antenna unit 7. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1 and also makes the secondpower supply unit 8 extract power from the radio wave received by thesecond antenna unit 7. The first and second antenna units send the extracted power to thecontrol unit 5. This therefore permits access from the communication device to thememory unit 6 through thefirst antenna unit 1, i.e., access from the communication device at a short distance to thememory unit 6 in theRFID tag 101, thereby allowing data write access and data read access to thememory unit 6. Even if some person has made malicious access, since such access must be made from a short distance, the user can easily visually check the access. - The
RFID tag 102 of the present invention includes, as the externalpower input unit 12, thesecond antenna unit 7 having lower radio wave reception sensitivity than thefirst antenna unit 1 and the secondpower supply unit 8 which extracts power from the radio wave received by thesecond antenna unit 7. Thememory unit 6 includes the protectedmemory unit 6A which stores data needing protection and theunprotected memory unit 6B which stores data needing no protection. In addition, thecontrol unit 5 includes theaccess inhibition unit 5C which inhibits access from a communication device to the protectedmemory unit 6A through thefirst antenna unit 1 if no power is received from the secondpower supply unit 8, and theaccess permission unit 5D which permits access from the communication device to the protectedmemory unit 6A through thefirst antenna unit 1 if power is received from the secondpower supply unit 8. - With this arrangement, when a communication device is located at a long distance from the RFID tag 102 (between the communicable distance of the
first antenna unit 1 and the communicable distance of the second antenna unit 7), thefirst antenna unit 1 of theRFID tag 102 receives a radio wave from the communication device. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1 and send the extracted power to thecontrol unit 5. In this case, since the power of radio waves from the communication device is insufficient for the reception sensitivity of thesecond antenna unit 7, the secondpower supply unit 8 cannot extract power, and hence cannot send power (external power) to thecontrol unit 5. This inhibits access from the communication device to the protectedmemory unit 6A through thefirst antenna unit 1, i.e., access from the communication device at a long distance to the protectedmemory unit 6A in theRFID tag 102. Note that this arrangement allows access from the communication device to theunprotected memory unit 6B through thefirst antenna unit 1, i.e., access from the communication device at a long distance to theunprotected memory unit 6B in theRFID tag 102. This allows access from a long distance to data requiring no protection and can properly protect only data requiring protection against malicious access from a long distance. - In contrast, when the communication device is located at a short distance from the RFID tag 102 (within the communicable distance of the second antenna unit 7), the power of radio waves from the communication device is sufficiently high for the reception sensitivity of the
second antenna unit 7. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1 and also makes the secondpower supply unit 8 extract power from the radio wave received by thesecond antenna unit 7. The first and second antenna units send the extracted power to thecontrol unit 5. This therefore permits access from the communication device to the protectedmemory unit 6A through thefirst antenna unit 1, i.e., access from the communication device at a short distance to the protectedmemory unit 6A in theRFID tag 102, thereby allowing data write access and data read access to the protectedmemory unit 6A. Even if some person has made malicious access, since such access must be made from a short distance, the user can easily visually check the access. - The
RFID tag 103 of the present invention includes, as the externalpower input unit 12, thesecond antenna unit 7 having lower radio wave reception sensitivity than thefirst antenna unit 1 and the secondpower supply unit 8 which extracts power from the radio wave received by thesecond antenna unit 7. In addition, thememory unit 6 includes thedata memory unit 6C which stores data and theflag memory unit 6D which stores, flag values indicating data stored at the addresses in thedata memory unit 6C need protection. Furthermore, thecontrol unit 5 includes theaccess inhibition unit 5E which inhibits access from a communication device to a data storage area in thedata memory unit 6C which is in protected state by a flag value in theflag memory unit 6D through thefirst antenna unit 1 if no power is received from the secondpower supply unit 8, and theaccess permission unit 5F which permits access from a communication device to a data storage area in thedata memory unit 6C which is in protected state by a flag value in theflag memory unit 6D through thefirst antenna unit 1. - With this arrangement, when a communication device is located at a long distance from the RFID tag 103 (between the communicable distance of the
first antenna unit 1 and the communicable distance of the second antenna unit 7), thefirst antenna unit 1 of theRFID tag 103 receives a radio wave from the communication device. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1 and send the extracted power to thecontrol unit 5. In this case, since the power of radio waves from the communication device is insufficient for the reception sensitivity of thesecond antenna unit 7, the secondpower supply unit 8 cannot extract power, and hence cannot send power (external power) to thecontrol unit 5. This therefore inhibits access from a communication device to a data storage area in thedata memory unit 6C which is in protected state through thefirst antenna unit 1, i.e., access from a communication device at a long distance to a data storage area in thedata memory unit 6C in theRFID tag 103 which is in protected state. Note that this arrangement allows access from the communication device to a data storage area in thedata memory unit 6C which is not in protected state through thefirst antenna unit 1, i.e., access from the communication device at a long distance to a data storage area in thedata memory unit 6C in theRFID tag 103 which is not in protected state. This allows access from a long distance to data requiring no protection and can properly protect only data requiring protection against malicious access from a long distance. In the present invention, each data storage area in the data memory unit can be, for example, an address in thedata memory unit 6C, a block comprising multiple addresses, or the like. - In contrast, when a communication device is located at a short distance from the RFID tag 103 (within the communicable distance of the second antenna unit 7), the power of radio waves from the communication device is sufficiently high for the reception sensitivity of the
second antenna unit 7. This makes the firstpower supply unit 2 extract power from the radio wave received by thefirst antenna unit 1 and makes the secondpower supply unit 8 extract power from the radio wave received by thesecond antenna unit 7. The first and second antenna units then send the extracted power to thecontrol unit 5. This therefore permits access from the communication device to a data storage area in thedata memory unit 6C which is in protected state through thefirst antenna unit 1, and permits access from the communication device at a short distance to a data storage area in thedata memory unit 6C in theRFID tag 103 which is in protected state, thereby allowing data write access and data read access to the data storage area set as a protection target. Even if some person has made malicious access, since such access must be made from a short distance, the user can easily visually check the access. - As described above, the present invention lets the RFID tag have the external
power input unit 12, and controls permission and inhibition of access from a communication device to thememory unit 6 in accordance with the presence/absence of external power from the externalpower input unit 12. This makes it possible to prevent malicious access from a long distance by providing thesecond antenna unit 7 and theconnection terminal 11 to the external power supply without physically removing part of an antenna. - In addition, the present invention controls permission and inhibition of access from a communication device to the protected
memory unit 6A and access to a data storage area in thedata memory unit 6C which is in protected state. This makes it possible to properly protect only data requiring protection against malicious access from a long distance and allow access from a long distance to data requiring no protection, thereby improving convenience.
Claims (16)
1. An RFID tag characterized by comprising:
an external power input unit which inputs external power;
a first antenna unit which receives power from a communication device;
a first power supply unit which extracts power from the radio wave received by said first antenna unit;
a memory unit; and
a control unit which operates upon receiving power from said first power supply unit and controls permission and inhibition of access from the communication device to said memory unit in accordance with presence/absence of input of power from said external power input unit.
2. A tag according to claim 1 , wherein said external power input unit inputs external power from a short distance shorter than a radio wave communicable distance of said first antenna unit.
3. A tag according to claim 1 , wherein said
external power input unit comprises
a second antenna unit which has radio wave reception sensitivity lower than that of said first antenna unit, and
a second power supply unit which extracts power from the radio wave received by the second antenna unit.
4. A tag according to claim 3 , wherein said
control unit comprises
an access inhibition unit which inhibits access from the communication device to said memory unit through said first antenna unit if no power is received from the second power supply unit, and
an access permission unit which permits access from the communication device to said memory unit through said first antenna unit if power is received from the second power supply unit.
5. A tag according to claim 3 , wherein
said memory unit comprises a protected memory unit which stores data needing protection, and an unprotected memory unit which stores data needing no protection, and
said control unit comprises an access inhibition unit which inhibits access from the communication device to the protected memory unit if no power is received from the second power supply unit, and an access permission unit which permits access from the communication device to the protected memory unit through said first antenna unit if power is received from the second power supply unit.
6. A tag according to claim 3 , wherein
said memory unit comprises a data memory unit which stores data, and a flag memory unit which stores a flag value indicating whether data stored at the addresses in the data memory unit need protection, and
said control unit comprises an access inhibition unit which inhibits access from the communication device to a data storage area in the data memory unit which is in protected state by a flag value in the flag memory unit through said first antenna unit if no power is received from the second power supply unit, and an access permission unit which permits access from the communication device to a data storage area in the data memory unit which is in protected state by a flag value in the flag memory unit through said first antenna unit if power is received from the second power supply unit.
7. A tag according to claim 3 , wherein
said memory unit comprises a data memory unit which stores data, and a flag memory unit which stores a flag value indicating whether data stored at the addresses in the data memory unit need protection, and
said control unit comprises an access inhibition unit which inhibits access from the communication device to the flag memory unit through said first antenna unit if no power is received from the second power supply unit, and an access permission unit which permits access from the communication device to the flag memory unit through said antenna unit if power is received from the second power supply unit.
8. A tag according to claim 3 , wherein
said memory unit comprises a protected memory unit which stores data needing protection, and an unprotected memory unit which stores data needing no protection, and
said control unit comprises an access inhibition unit which inhibits access from the communication device to the protected memory unit through said first antenna unit if no power is received from the second power supply unit, and an access permission unit which permits access from the communication device to the protected memory unit through the second antenna unit if power is received from the second power supply unit.
9. A tag according to claim 3 , wherein
said memory unit comprises a data memory unit which stores data, and a flag memory unit which stores a flag value indicating whether data stored at the addresses in the data memory unit need protection, and
said control unit comprises an access inhibition unit which inhibits access from the communication device to a data storage area in the data memory unit which is in protected state by a flag value in the flag memory unit through said first antenna unit if no power is received from the second power supply unit, and an access permission unit which permits access from the communication device to a data storage area in the data memory unit which is in protected state by a flag value in the flag memory unit through the second antenna unit.
10. A tag according to claim 3 , wherein said first
antenna unit and the second antenna unit use different frequency bands for communication.
11. A tag according to claim 10 , wherein the second antenna unit receives a radio wave from a radio wave source different from the communication device.
12. A tag according to claim 1 , wherein the
external power input unit comprises a connection terminal to an external power supply.
13. A tag according to claim 12 , wherein said
control unit comprises
an access inhibition unit which inhibits access from the communication device to said memory unit through said first antenna unit if the external power supply does not connect to the connection terminal, and
an access permission unit which permits access from the communication device to said memory unit through said first antenna unit if the external power supply connects to the connection terminal.
14. A tag according to claim 12 , wherein
said memory unit comprises a protected memory unit which stores data needing protection, and an unprotected memory unit which stores data needing no protection, and
said control unit comprises an access inhibition unit which inhibits access from the communication device to the protected memory unit through said first antenna unit if the external power supply does not connect to the connection terminal, and an access permission unit which permits access from the communication device to the protected memory unit through said first antenna unit if the external power supply connects to the connection terminal.
15. A tag according to claim 12 , wherein
said memory unit comprises a data memory unit which stores data, and a flag memory unit which stores a flag value indicating whether data stored at the addresses in the data memory unit need protection, and
said control unit comprises an access inhibition unit which inhibits access from the communication device to a data storage area in the data memory unit which is in protected state by a flag value in the flag memory unit through said first antenna unit if the external power supply does not connect to the connection terminal, and an access permission unit which permits access from the communication device to a data storage area in the data memory unit which is in protected state by a flag value in the flag memory unit through said first antenna unit if the external power supply connects to the connection terminal.
16. A tag according to claim 12 , wherein
said memory unit comprises a data memory unit which stores data, and a flag memory unit which stores a flag value indicating whether data stored at the addresses in the data memory unit need protection, and
said control unit comprises an access inhibition unit which inhibits access from the communication device to the flag memory unit through said first antenna unit if the external power supply does not connect to the connection terminal, and an access permission unit which permits access from the communication device to the flag memory unit through said first antenna unit if the external power supply connects to the connection terminal.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006080490A JP2007257267A (en) | 2006-03-23 | 2006-03-23 | Wireless tag |
JP080490/2006 | 2006-03-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070222610A1 true US20070222610A1 (en) | 2007-09-27 |
Family
ID=38532797
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/723,876 Abandoned US20070222610A1 (en) | 2006-03-23 | 2007-03-22 | RFID tag |
Country Status (3)
Country | Link |
---|---|
US (1) | US20070222610A1 (en) |
JP (1) | JP2007257267A (en) |
CN (1) | CN101042741A (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080007578A1 (en) * | 2006-07-06 | 2008-01-10 | Canon Kabushiki Kaisha | Liquid container and recording apparatus |
US20080150727A1 (en) * | 2006-12-20 | 2008-06-26 | Hitachi Plant Technologies, Ltd. | Rfid tag and construction site management system and management method using the same |
US20090027162A1 (en) * | 2007-07-23 | 2009-01-29 | Forster Ian J | Controllable rfid device, and method |
US20090109001A1 (en) * | 2007-10-31 | 2009-04-30 | Hitachi, Ltd. | Wireless IC tag, wireless IC tag system and operation method for wireless IC tag |
US20090322479A1 (en) * | 2007-05-23 | 2009-12-31 | Sony Corporation | Communications system and communications apparatus |
US20100245054A1 (en) * | 2007-11-21 | 2010-09-30 | Nam Yun Kim | Near Field Radio Frequency Communication System |
US20110205032A1 (en) * | 2010-02-25 | 2011-08-25 | Toshiba Tec Kabushiki Kaisha | Display device |
US20110241846A1 (en) * | 2010-03-30 | 2011-10-06 | Alcatel-Lucent Usa Inc. | Technique For Effective Communications With Mobile Sensors In A Sensor System |
US20110285511A1 (en) * | 2009-06-12 | 2011-11-24 | Impinji, Inc. | Dual-frequency rfid tag with isolated inputs |
AT506438B1 (en) * | 2008-01-22 | 2012-04-15 | Evva Sicherheitstechnologie | READER FOR NAHFELD OR RFID APPLICATIONS |
CN102542318A (en) * | 2011-12-16 | 2012-07-04 | 深圳市江波龙电子有限公司 | Near-field radiofrequency communication card and communication terminal |
US20130179667A1 (en) * | 2010-09-29 | 2013-07-11 | Beijing Lenovo Software Ltd. | Methods and systems for state switching |
DE202011110344U1 (en) | 2010-12-01 | 2013-10-23 | Boon Hwee Bernette NG | Fastenable device support with a means of communication |
US20130335197A1 (en) * | 2012-06-15 | 2013-12-19 | Thales | Electronic system comprising of a plurality of electronic equipment units, electronic equipment for such a system and method for management and maintenance of such a system |
US9142881B1 (en) | 2008-08-29 | 2015-09-22 | Impinj, Inc. | RFID tag circuits with floating differential inputs |
US20150296381A1 (en) * | 2014-04-11 | 2015-10-15 | Nxp B.V. | Electronic circuit chip for an rfid tag with a read-only-once functionality |
WO2016115424A1 (en) * | 2015-01-16 | 2016-07-21 | Tego, Inc. | Methods and systems for memory facilities on an rfid tag |
US20160210084A1 (en) * | 2005-12-09 | 2016-07-21 | Tego, Inc. | System and method for emulating many time programmable memory |
US9542577B2 (en) | 2005-12-09 | 2017-01-10 | Tego, Inc. | Information RFID tagging facilities |
US9594998B2 (en) | 2005-12-09 | 2017-03-14 | Tego, Inc. | Radio frequency identification tag with hardened memory system |
US9710682B2 (en) | 2005-12-09 | 2017-07-18 | Tego, Inc. | Operating systems for an RFID tag |
US9715609B1 (en) * | 2013-03-11 | 2017-07-25 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Systems, apparatuses and methods for beamforming RFID tags |
US9953193B2 (en) | 2014-09-30 | 2018-04-24 | Tego, Inc. | Operating systems for an RFID tag |
US20180225486A1 (en) * | 2015-09-04 | 2018-08-09 | Sony Corporation | Information processing device, information processing method, and program |
US10204246B1 (en) * | 2011-08-02 | 2019-02-12 | Impinj, Inc. | RFID tags with port-dependent functionality |
US10455816B2 (en) * | 2016-07-20 | 2019-10-29 | International Business Machines Corporation | Sensor based activity monitor |
US10572395B2 (en) * | 2016-09-07 | 2020-02-25 | Intel Corporation | Non-enclave access prevention |
US20200125279A1 (en) * | 2018-10-23 | 2020-04-23 | Toshiba Memory Corporation | Memory system locking or unlocking data read to nonvolatile memory and control method thereof |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5096102B2 (en) * | 2007-10-17 | 2012-12-12 | 株式会社ユニバーサルエンターテインメント | Radio communication tag and radio communication system |
US9201416B2 (en) * | 2012-01-24 | 2015-12-01 | Fisher Controls International Llc | Asset data modules including an integral near field communication interface |
US8833666B2 (en) * | 2012-03-09 | 2014-09-16 | Infineon Technologies Ag | Smart card device |
JP2014006867A (en) * | 2012-06-01 | 2014-01-16 | Toshiba Corp | Wireless communication device and wireless communication system |
CN104156754B (en) * | 2014-07-22 | 2017-08-25 | 赵伊宁 | The anti-theft device of non-contact IC card |
CN109325577A (en) * | 2018-09-10 | 2019-02-12 | 李文昌 | A kind of rfid circuit and non-contact IC card alarm |
-
2006
- 2006-03-23 JP JP2006080490A patent/JP2007257267A/en not_active Withdrawn
-
2007
- 2007-03-22 US US11/723,876 patent/US20070222610A1/en not_active Abandoned
- 2007-03-23 CN CNA2007100893177A patent/CN101042741A/en active Pending
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10691992B2 (en) | 2005-12-09 | 2020-06-23 | Tego, Inc. | RF tag with memory management |
US9858452B2 (en) | 2005-12-09 | 2018-01-02 | Tego, Inc. | Information RFID tagging facilities |
US9842290B2 (en) | 2005-12-09 | 2017-12-12 | Tego, Inc. | Flight-cycle sensor monitoring of aviation component |
US9710682B2 (en) | 2005-12-09 | 2017-07-18 | Tego, Inc. | Operating systems for an RFID tag |
US9594998B2 (en) | 2005-12-09 | 2017-03-14 | Tego, Inc. | Radio frequency identification tag with hardened memory system |
US9542577B2 (en) | 2005-12-09 | 2017-01-10 | Tego, Inc. | Information RFID tagging facilities |
US9465559B2 (en) * | 2005-12-09 | 2016-10-11 | Tego, Inc. | System and method for emulating many time programmable memory |
US20160210084A1 (en) * | 2005-12-09 | 2016-07-21 | Tego, Inc. | System and method for emulating many time programmable memory |
US10430702B2 (en) | 2005-12-09 | 2019-10-01 | Tego, Inc. | RF tag network connectivity through gateway facility |
US20080007578A1 (en) * | 2006-07-06 | 2008-01-10 | Canon Kabushiki Kaisha | Liquid container and recording apparatus |
US7708395B2 (en) * | 2006-07-06 | 2010-05-04 | Canon Kabushiki Kaisha | Liquid container with wireless communication antennas |
US7880620B2 (en) * | 2006-12-20 | 2011-02-01 | Hitachi Plant Technologies, Ltd. | RFID tag and construction site management system and management method using the same |
US20080150727A1 (en) * | 2006-12-20 | 2008-06-26 | Hitachi Plant Technologies, Ltd. | Rfid tag and construction site management system and management method using the same |
US8598985B2 (en) * | 2007-05-23 | 2013-12-03 | Sony Corporation | Communications system and communications apparatus |
US11017622B2 (en) | 2007-05-23 | 2021-05-25 | Sony Corporation | Communications system and communications apparatus |
US9792743B2 (en) | 2007-05-23 | 2017-10-17 | Sony Corporation | Communications system and communications apparatus |
US20090322479A1 (en) * | 2007-05-23 | 2009-12-31 | Sony Corporation | Communications system and communications apparatus |
US10497194B2 (en) | 2007-05-23 | 2019-12-03 | Sony Corporation | Communications system and communications apparatus |
US20090027162A1 (en) * | 2007-07-23 | 2009-01-29 | Forster Ian J | Controllable rfid device, and method |
US20090109001A1 (en) * | 2007-10-31 | 2009-04-30 | Hitachi, Ltd. | Wireless IC tag, wireless IC tag system and operation method for wireless IC tag |
US20100245054A1 (en) * | 2007-11-21 | 2010-09-30 | Nam Yun Kim | Near Field Radio Frequency Communication System |
AT506438B1 (en) * | 2008-01-22 | 2012-04-15 | Evva Sicherheitstechnologie | READER FOR NAHFELD OR RFID APPLICATIONS |
US9142881B1 (en) | 2008-08-29 | 2015-09-22 | Impinj, Inc. | RFID tag circuits with floating differential inputs |
US20110285511A1 (en) * | 2009-06-12 | 2011-11-24 | Impinji, Inc. | Dual-frequency rfid tag with isolated inputs |
US9087281B2 (en) * | 2009-06-12 | 2015-07-21 | Impinj, Inc. | Dual-frequency RFID tag with isolated inputs |
US20110205032A1 (en) * | 2010-02-25 | 2011-08-25 | Toshiba Tec Kabushiki Kaisha | Display device |
US9152175B2 (en) * | 2010-02-25 | 2015-10-06 | Toshiba Tec Kabushiki Kaisha | Display device |
US20110241846A1 (en) * | 2010-03-30 | 2011-10-06 | Alcatel-Lucent Usa Inc. | Technique For Effective Communications With Mobile Sensors In A Sensor System |
US10037206B2 (en) * | 2010-09-29 | 2018-07-31 | Lenovo (Beijing) Limited | Methods and systems for state switching |
US20130179667A1 (en) * | 2010-09-29 | 2013-07-11 | Beijing Lenovo Software Ltd. | Methods and systems for state switching |
DE202011110344U1 (en) | 2010-12-01 | 2013-10-23 | Boon Hwee Bernette NG | Fastenable device support with a means of communication |
US10204246B1 (en) * | 2011-08-02 | 2019-02-12 | Impinj, Inc. | RFID tags with port-dependent functionality |
US10650201B1 (en) * | 2011-08-02 | 2020-05-12 | Impinj, Inc. | RFID tags with port-dependent functionality |
CN102542318A (en) * | 2011-12-16 | 2012-07-04 | 深圳市江波龙电子有限公司 | Near-field radiofrequency communication card and communication terminal |
US20130335197A1 (en) * | 2012-06-15 | 2013-12-19 | Thales | Electronic system comprising of a plurality of electronic equipment units, electronic equipment for such a system and method for management and maintenance of such a system |
US9715609B1 (en) * | 2013-03-11 | 2017-07-25 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Systems, apparatuses and methods for beamforming RFID tags |
US9977121B1 (en) * | 2013-03-11 | 2018-05-22 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Systems and methods for beam forming RFID tags |
US20150296381A1 (en) * | 2014-04-11 | 2015-10-15 | Nxp B.V. | Electronic circuit chip for an rfid tag with a read-only-once functionality |
US9953193B2 (en) | 2014-09-30 | 2018-04-24 | Tego, Inc. | Operating systems for an RFID tag |
US10445536B2 (en) | 2014-09-30 | 2019-10-15 | Tego, Inc. | Operating system for an RF tag |
US10204244B2 (en) | 2014-09-30 | 2019-02-12 | Tego, Inc. | Data aggregating radio frequency tag |
US10891449B2 (en) | 2014-09-30 | 2021-01-12 | Tego, Inc. | Self-monitoring wireless computing device |
WO2016115424A1 (en) * | 2015-01-16 | 2016-07-21 | Tego, Inc. | Methods and systems for memory facilities on an rfid tag |
US20180225486A1 (en) * | 2015-09-04 | 2018-08-09 | Sony Corporation | Information processing device, information processing method, and program |
US11227130B2 (en) * | 2015-09-04 | 2022-01-18 | Sony Corporation | Information processing device, information processing method, and program |
US10455816B2 (en) * | 2016-07-20 | 2019-10-29 | International Business Machines Corporation | Sensor based activity monitor |
US10572395B2 (en) * | 2016-09-07 | 2020-02-25 | Intel Corporation | Non-enclave access prevention |
US20200125279A1 (en) * | 2018-10-23 | 2020-04-23 | Toshiba Memory Corporation | Memory system locking or unlocking data read to nonvolatile memory and control method thereof |
US10838632B2 (en) * | 2018-10-23 | 2020-11-17 | Toshiba Memory Corporation | Memory system locking or unlocking data read to nonvolatile memory and control method thereof |
Also Published As
Publication number | Publication date |
---|---|
JP2007257267A (en) | 2007-10-04 |
CN101042741A (en) | 2007-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070222610A1 (en) | RFID tag | |
US7755469B2 (en) | Radio frequency identification tag and radio frequency identification privacy protection system and method | |
US20080129447A1 (en) | Electronic tag for protecting privacy and method of protecting privacy using the same | |
JP5107934B2 (en) | Communication control method, RFID device, and RFID system | |
US20080230615A1 (en) | Near-field communication card for communication of contact information | |
US8665074B1 (en) | RFID tag chips and tags with alternative behaviors and methods | |
US20080012685A1 (en) | Scalable method for access control | |
US8121532B2 (en) | Radio frequency identification tag and operating method thereof | |
US8115590B1 (en) | RFID readers limiting theft of confidential information | |
KR101813658B1 (en) | RFID based genuine product certification service system and method using cipher update algorithm for forgery prevention | |
US20030233565A1 (en) | Computer systems such as smart cards having memory architectures that can protect security information, and methods of using same | |
US7946497B2 (en) | Non-contact IC, information processing apparatus, reader/writer, and use restriction method | |
US20070205864A1 (en) | Secure radio frequency identification system | |
CN101976362A (en) | Radio frequency identification tag access method based on bitmap and device | |
EP2893487B1 (en) | Read/write device and transponder for exchanging data via an electromagnetic field | |
JP2007293481A (en) | Wireless tag system, wireless tag, and reader/writer | |
US8183983B2 (en) | Method for the at least temporary activation of bidirectional communication and transponder | |
US20060109122A1 (en) | Anti-theft arrangement, method and program | |
US20060124754A1 (en) | Portable electronic apparatus | |
KR101112535B1 (en) | Method for Authenticating RFID Readers by Using Flags in RFID Tag | |
Gavoni | RFID exploitation and countermeasures | |
CN102708393B (en) | Transponder, method and reader for monitoring access to application data in the transponder | |
KR20070059946A (en) | Rfid tag device and method for operating the same | |
KR20040092670A (en) | A method for certifying a rfid tag with security function | |
US20100199059A1 (en) | Mobile communication device and method for defragging mifare memory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NEC CORPORATION, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TAGATO, HIROKI;REEL/FRAME:019137/0193 Effective date: 20070312 |
|
STCB | Information on status: application discontinuation |
Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION |